Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-41800 — Command Injection in F5 Big-ip Application Security Manager
Severity
8.7HIGHNVD
EPSS
92.7%
top 0.25%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 7
Description
In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:NExploitability: 2.3 | Impact: 5.8
Affected Packages12 packages
🔴Vulnerability Details
3GHSA▶
GHSA-cqcj-7vqr-p254: In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode↗2022-12-07
VulnCheck▶
F5 big-ip_access_policy_manager Improper Neutralization of Special Elements used in a Command ('Command Injection')↗2022
💥Exploits & PoCs
1Nuclei▶
F5 BIG-IP Appliance Mode - Command Injection
📋Vendor Advisories
1F5▶
CVE-2022-41800: In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may ...↗2022-12-07