Ron Bowes, a security researcher from Rapid7, disclosed a high-severity vulnerability in F5 BIG-IP products. The vulnerability dubbed as Format String Vulnerability is being tracked under the identifier CVE-2023-22374 and is considered high severity with a CVSS score of 7.5 out of 10 on the scale. According to Mr. Bowes, the vulnerability is stemmed from the iControl Simple Object Access Protocol (SOAP) interface, eventually causing the iControl SOAP CGI process crashes arbitrary code execution or denial of service on the vulnerable devices. This force the organizations who own the F5 BIG-IP products to fix the vulnerability. Well, there is no official fix released to fix the vulnerability. However, there are a few guidelines that were suggested to follow, which could lower the attack surface to a grater extent. Let’s see how to mitigate CVE-2023-22374, a high-severity Format String Vulnerability In F5 BIG-IP Products in this post.
Are you ready to take your application experience to the next level? Get acquainted with F5 BIG-IP, a powerful product that helps you optimize and secure applications in any environment.
F5 BIG-IP is an advanced solution for application delivery and security that offers unparalleled performance and scalability. Not only does it provide visibility into application performance, but it also delivers secure user access and helps you control application delivery based on rules you set.
F5 BIG-IP is a great choice for companies of all sizes that need to improve their application security, performance, and availability. With F5 BIG-IP, they can ensure that applications are available with high speeds and low latency and have the ability to configure policies that control access to applications from any device.
Simple Object Access Protocol (SOAP) is an XML-based messaging protocol specification for exchanging structured information in the implementation of web services in computer networks. SOAP is used in the Report Server Web service to act as a communication interface between client programs and the report server over HTTP. It enables applications to communicate over a network.
SOAP messages are sent in the form of an envelope that contains header and body elements. The header element provides information about the sender and receiver, while the body elements contain the actual data to be transmitted. SOAP allows applications to access remote services over the network. This makes it possible for different applications and systems to integrate easily and securely.
This is a high severity authenticated Format String Vulnerability in the SOAP interface controlportal.cgi of the F5 BIG-IP products that allows an authenticated attacker to crash the iControl SOAP CGI process, execute arbitrary code, which eventually causes denial of service on the vulnerable devices.
This vulnerability allows an authenticated attacker with network access to iControl SOAP to crash the iControl SOAP CGI process or carry out a denial-of-service (DoS) attack on the iControl SOAP CGI process through the BIG-IP management hostname/IP:port.
To successfully exploit the command execution attack vector, the attacker must gather knowledge about the environment in which the vulnerable component exists. There is no data plane exposure; this is a control plane issue only. Appliance mode is enforced by a specific license or may be enabled or disabled for individual Virtual Clustered Multiprocessing (vCMP) guest instances. For more information about Appliance mode, refer to K12815: Overview of Appliance mode.
– Ron Bowes
Before we dive into the technical details of the vulnerability, it is good to understand the format string attack. It is a type of cyber attack on applications that allow attackers to control the parameters passed to the function by injecting custom format specifiers into a format string to the function that performs the formatting. This attack commonly leads to unintended behavior such as a crash, arbitrary code execution, or disclosure of sensitive information.
CVE-2023-22374 is a format string vulnerability in the SOAP interface. This vulnerability allows attackers to read and write memory addresses by inserting format string specifiers (such as %s or %n) into certain GET parameters. Such attacks are practically not easy to exploit because it is difficult to use specific memory addresses. Please read the complete technical details here.
F5 Network says that this flaw affects pretty much all the modules of BIG-IP, that is 13.x to 17.x.
BIG-IP SPK, BIG-IQ Centralized Management, F5OS-A, F5OS-C, NGINX, and Traffix SDC are safe from this flaw.
Vulnerable versions are:
F5 BIG-IP 17.0.0
F5 BIG-IP 16.1.2.2 – 16.1.3
F5 BIG-IP 15.1.5.1 – 15.1.8
F5 BIG-IP 14.1.4.6 – 14.1.5
F5 BIG-IP 13.1.5
Unfortunately, there is no official patch has been released to permanently fix the vulnerability at the time of publishing this post. F5 has indicated that an engineering hotfix will be made available soon. Since this vulnerability could be exploited only by an authenticated user, the best mitigation would be to restrict access to the management port and system’s iControl SOAP API to only trusted administrators.
Change the Port Lockdown set to Allow None Block for each self IP address in the system to block all access to the iControl REST interface of your BIG-IP system. If you want to open any custom port, use, Allow Custom option.
Limit the management portal access only to trusted users and devices over a secure network.
Modify the BIG-IP HTTP configuration if in case it is not possible to do the above two mitigation actions.
Command to enter the TMOS Shelltmsh
Command to edit the httpd configuration file.edit /sys httpd all-properties
Find the line that starts with ‘include none’ and replace ‘none’ with the following text:
In BIG-IP v14.1.0 and later
“<If \”%{HTTP:connection} =~ /close/i \”>RequestHeader set connection close</If><ElseIf \”%{HTTP:connection} =~ /keep-alive/i \”>RequestHeader set connection keep-alive</ElseIf><Else> RequestHeader set connection close</Else>”
In BIG-IP v14.0.0 and earlier
“RequestHeader set connection close”
Hit ‘Esc‘ Key then ‘:wq‘ as like in VI editor.
save /sys config
On top of this, We recommend referring to these KB articles to implement best practices that eventually reduce the attack surface:
We hope this post helps you know how to mitigate CVE-2023-22374, a high-severity Format String Vulnerability In F5 BIG-IP Products. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
How to Fix CVE-2022-1388- A Critical RCE Vulnerability In BIG-IP
CVE-2023-46747- How to Fix the Critical Remote Code Execution Vulnerability in BIG-IP?
How To Fix CVE-2022-27511(2), Security Bypass Vulnerability In Citrix ADM
How to Patch the 3 New Critical Vulnerabilities in Citrix ADC and Gateway Products
How to Fix CVE-2023-3519- An Unauthenticated Remote Code Execution Vulnerability in Citrix Products?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.