CVE-2022-41800 Scanner
CVE-2022-41800 Scanner - Command Injection vulnerability in F5 BIG-IP Access Policy Manager
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
25 days 13 hours
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Product Overview:
F5 BIG-IP Access Policy Manager (APM) is a comprehensive solution for providing secure, scalable access to applications and networks. It is used by enterprises to manage user access across various platforms and devices. The APM allows administrators to configure and enforce access policies to ensure proper security levels. It also integrates with existing network infrastructures, supporting multi-factor authentication and other security protocols. The appliance mode, a feature in F5 BIG-IP, is designed to secure configurations and restrict unauthorized access. Vulnerabilities in this system can result in severe consequences if exploited by attackers.
Vulnerability Overview:
The CVE-2022-41800 vulnerability relates to a command injection in F5 BIG-IP Access Policy Manager when operating in Appliance mode. This issue allows an authenticated administrator to bypass appliance mode restrictions and exploit a vulnerable iControl REST endpoint. This breach could lead to unauthorized execution of remote commands, increasing the risk of system compromise. The exploitation involves leveraging inadequate validation of user roles and permissions in the Appliance mode configuration. This vulnerability is critical for systems that have not been updated with the latest security patches. The ability to remotely execute commands poses significant security concerns for affected systems.
Vulnerability Details:
The vulnerability arises from improper access control in the iControl REST API of the F5 BIG-IP Access Policy Manager when running in Appliance mode. An authenticated user with Administrator privileges can bypass restrictions meant to prevent unauthorized execution. By exploiting this flaw, the attacker can send crafted requests to the vulnerable iControl REST endpoint, enabling them to execute arbitrary commands on the affected system. These commands can be used to further compromise the system, gain unauthorized access, or execute malicious operations. The vulnerability is triggered through specific API endpoints that fail to properly check user roles and permissions. The issue is particularly dangerous as it enables remote command execution without the need for further authentication, making it easy to exploit for attackers with basic access privileges.
Possible Effects:
If exploited, CVE-2022-41800 can allow remote command execution on the affected F5 BIG-IP Access Policy Manager system. Attackers can gain control over the server, execute arbitrary commands, and manipulate system settings. This can result in data leakage, system corruption, or the deployment of additional malicious payloads. A successful attack could also enable the attacker to escalate privileges and take full control of the system. Furthermore, the exploit could be used to pivot to other parts of the network or launch further attacks, compromising the confidentiality, integrity, and availability of organizational data and systems.
References: