CVE-2020-5948

9.6 CRITICAL

📋 TL;DR

This vulnerability is a reflected Cross-Site Scripting (XSS) attack in the iControl REST interface of F5 BIG-IP devices. It allows attackers to execute arbitrary JavaScript in the context of an admin user's session, potentially leading to full system compromise. Affected users are those running vulnerable BIG-IP versions with iControl REST enabled.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, 11.6.1-11.6.5.2
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires iControl REST interface to be enabled and accessible. Admin role victim is required for full compromise.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the BIG-IP system, allowing attacker to gain administrative control, steal credentials, modify configurations, and pivot to internal networks.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized configuration changes leading to service disruption or data exfiltration.

🟢

If Mitigated

Limited to session hijacking if admin access is restricted, but still poses significant risk to system integrity.

🌐 Internet-Facing: HIGH - iControl REST endpoints are often exposed for management, making them accessible to external attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but requires access to the management network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires social engineering to trick admin into clicking malicious link, but exploitation itself is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in 16.0.1, 15.1.1, 14.1.3, 13.1.4, 12.1.6, 11.6.6 and later

Vendor Advisory: https://support.f5.com/csp/article/K42696541

Restart Required: No

Instructions:

1. Download appropriate fixed version from F5 Downloads. 2. Backup current configuration. 3. Install update via GUI or CLI. 4. Verify installation and test functionality.

🔧 Temporary Workarounds

Restrict iControl REST Access

linux

Limit access to iControl REST endpoints to trusted IP addresses only

tmsh modify /sys httpd allow replace-all-with { trusted_ip1 trusted_ip2 }

Disable iControl REST

linux

Turn off iControl REST interface if not required

tmsh modify /sys httpd restjavad enable false

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BIG-IP management interfaces
  • Enforce strong authentication and session management controls

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version with 'tmsh show /sys version' and compare against affected versions list

Check Version:

tmsh show /sys version

Verify Fix Applied:

Verify version is 16.0.1+, 15.1.1+, 14.1.3+, 13.1.4+, 12.1.6+, or 11.6.6+

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to iControl REST endpoints with script tags or JavaScript payloads
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • HTTP requests containing malicious script payloads to /mgmt/tm/* endpoints
  • Unexpected outbound connections from BIG-IP management interface

SIEM Query:

source="bigip_logs" AND (uri="/mgmt/tm/*" AND (body="<script>" OR body="javascript:"))

🔗 References

📤 Share & Export