CVE-2021-22980

7.8 HIGH

📋 TL;DR

This CVE describes an untrusted search path vulnerability in F5 BIG-IP APM Client Troubleshooting Utility (CTU) for Windows. Attackers can exploit this by placing a malicious DLL in the same directory as the utility, which gets loaded when a user runs the CTU tool. Only Windows systems running specific vulnerable versions of the Edge Client are affected.

💻 Affected Systems

Products:
  • F5 BIG-IP APM Client Troubleshooting Utility (CTU)
Versions: Edge Client 7.2.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, and 7.1.x-7.1.8.x before 7.1.8.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of the CTU utility. Software versions that have reached End of Software Development (EoSD) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through arbitrary code execution with the privileges of the user running the CTU utility, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Local privilege escalation or malware execution on the affected Windows system, potentially leading to credential theft or persistence mechanisms.

🟢

If Mitigated

Limited impact due to user interaction requirement and proper access controls preventing unauthorized users from placing files in CTU directories.

🌐 Internet-Facing: LOW - This vulnerability requires local access and user interaction to exploit, not directly exploitable over the network.
🏢 Internal Only: MEDIUM - Internal attackers with access to place files in CTU directories could exploit this, but user interaction requirement reduces immediate risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (victim must run the CTU utility) and ability to place malicious DLL in the same directory as the utility.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Edge Client 7.2.1.1, 7.1.9.8, or 7.1.8.5 and later

Vendor Advisory: https://support.f5.com/csp/article/K29282483

Restart Required: Yes

Instructions:

1. Download the patched version from F5 Downloads. 2. Uninstall the vulnerable Edge Client. 3. Install the patched version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict CTU Directory Permissions

windows

Limit write access to the CTU utility directory to prevent unauthorized DLL placement

icacls "C:\Program Files\F5 Networks\APM\CTU" /deny Everyone:(OI)(CI)W

Disable CTU Utility

windows

Remove or restrict execution of the CTU utility if not required

takeown /f "C:\Program Files\F5 Networks\APM\CTU\ctu.exe" /r
icacls "C:\Program Files\F5 Networks\APM\CTU\ctu.exe" /deny Everyone:(OI)(CI)RX

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent unauthorized users from writing to CTU directories
  • Educate users not to run the CTU utility from untrusted directories or with elevated privileges

🔍 How to Verify

Check if Vulnerable:

Check Edge Client version via Control Panel > Programs and Features or run 'apmclient.exe --version' from command line

Check Version:

apmclient.exe --version

Verify Fix Applied:

Verify installed version is 7.2.1.1, 7.1.9.8, or 7.1.8.5 or later

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing CTU execution from unusual directories
  • Process creation events for ctu.exe with suspicious parent processes

Network Indicators:

  • Unusual outbound connections from systems running CTU utility

SIEM Query:

Process Creation where ImagePath ends with 'ctu.exe' and CommandLine contains unusual parameters

🔗 References

📤 Share & Export