CVE-2022-41800 Scanner

CVE-2022-41800 Scanner - Command Injection vulnerability in F5 BIG-IP Access Policy Manager

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

25 days 13 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

Product Overview:

F5 BIG-IP Access Policy Manager (APM) is a comprehensive solution for providing secure, scalable access to applications and networks. It is used by enterprises to manage user access across various platforms and devices. The APM allows administrators to configure and enforce access policies to ensure proper security levels. It also integrates with existing network infrastructures, supporting multi-factor authentication and other security protocols. The appliance mode, a feature in F5 BIG-IP, is designed to secure configurations and restrict unauthorized access. Vulnerabilities in this system can result in severe consequences if exploited by attackers.

Vulnerability Overview:

The CVE-2022-41800 vulnerability relates to a command injection in F5 BIG-IP Access Policy Manager when operating in Appliance mode. This issue allows an authenticated administrator to bypass appliance mode restrictions and exploit a vulnerable iControl REST endpoint. This breach could lead to unauthorized execution of remote commands, increasing the risk of system compromise. The exploitation involves leveraging inadequate validation of user roles and permissions in the Appliance mode configuration. This vulnerability is critical for systems that have not been updated with the latest security patches. The ability to remotely execute commands poses significant security concerns for affected systems.

Vulnerability Details:

The vulnerability arises from improper access control in the iControl REST API of the F5 BIG-IP Access Policy Manager when running in Appliance mode. An authenticated user with Administrator privileges can bypass restrictions meant to prevent unauthorized execution. By exploiting this flaw, the attacker can send crafted requests to the vulnerable iControl REST endpoint, enabling them to execute arbitrary commands on the affected system. These commands can be used to further compromise the system, gain unauthorized access, or execute malicious operations. The vulnerability is triggered through specific API endpoints that fail to properly check user roles and permissions. The issue is particularly dangerous as it enables remote command execution without the need for further authentication, making it easy to exploit for attackers with basic access privileges.

Possible Effects:

If exploited, CVE-2022-41800 can allow remote command execution on the affected F5 BIG-IP Access Policy Manager system. Attackers can gain control over the server, execute arbitrary commands, and manipulate system settings. This can result in data leakage, system corruption, or the deployment of additional malicious payloads. A successful attack could also enable the attacker to escalate privileges and take full control of the system. Furthermore, the exploit could be used to pivot to other parts of the network or launch further attacks, compromising the confidentiality, integrity, and availability of organizational data and systems.

References:

Get started to protecting your Free Full Security Scan