⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.. Due date: 2023-11-21.
CVE-2023-46747 — Authentication Bypass Using an Alternate Path or Channel in F5 Big-ip Access Policy Manager
Severity
9.8CRITICALNVD
EPSS
94.4%
top 0.01%
CISA KEV
KEVRansomware
Added 2023-10-31
Due 2023-11-21
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedOct 26
KEV addedOct 31
Latest updateNov 20
KEV dueNov 21
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages21 packages
🔴Vulnerability Details
3GHSA▶
GHSA-pq6p-fc96-wc5w: Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the manage↗2023-10-26
💥Exploits & PoCs
1Nuclei▶
F5 BIG-IP - Unauthenticated RCE via AJP Smuggling
🔍Detection Rules
6Suricata▶
ET EXPLOIT F5 BIG-IP - Successful Password Reset Attempt - Observed Post CVE-2023-46747 Activity↗2023-11-20
Suricata
▶
Suricata▶
ET EXPLOIT F5 BIG-IP - Unauthenticated RCE via AJP Smuggling Request - User Creation (CVE-2023-46747)↗2023-11-03
Suricata
▶
Suricata▶
ET EXPLOIT F5 BIG-IP - Unauthenticated RCE via AJP Smuggling Request - User Deletion (CVE-2023-46747)↗2023-11-03
📋Vendor Advisories
3F5▶
CVE-2023-46747: Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the...↗2023-10-26