CVE-2021-22986
📋 TL;DR
CVE-2021-22986 is an unauthenticated remote command execution vulnerability in the iControl REST interface of F5 BIG-IP and BIG-IQ devices. Attackers can exploit this to execute arbitrary commands on affected systems without authentication. This affects multiple versions of BIG-IP (12.1.x-16.0.x) and BIG-IQ (7.0.0.x-7.1.0.x) that haven't been patched.
💻 Affected Systems
- F5 BIG-IP
- F5 BIG-IQ
📦 What is this software?
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to gain root access, steal sensitive data, deploy ransomware, pivot to internal networks, and maintain persistent access.
Likely Case
Remote code execution leading to data exfiltration, installation of backdoors, credential theft, and lateral movement within the network.
If Mitigated
Limited impact if proper network segmentation, access controls, and monitoring are in place, though exploitation attempts may still cause service disruption.
🎯 Exploit Status
Multiple public exploit scripts and proof-of-concepts are available. The vulnerability is actively exploited in the wild.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: BIG-IP: 12.1.5.3, 13.1.3.6, 14.1.4, 15.1.2.1, 16.0.1.1; BIG-IQ: 7.0.0.2, 7.1.0.3
Vendor Advisory: https://support.f5.com/csp/article/K03009991
Restart Required: Yes
Instructions:
1. Download appropriate hotfix from F5 Downloads. 2. Upload to BIG-IP/BIG-IQ. 3. Install using WebUI or CLI. 4. Reboot system as required.
🔧 Temporary Workarounds
Block iControl REST Access
allRestrict access to iControl REST interface using network controls
Configure firewall rules to block external access to iControl REST ports (typically 443)
Disable iControl REST
linuxTemporarily disable the vulnerable service if not required
tmsh modify /sys httpd service disable
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices
- Deploy intrusion detection/prevention systems with signatures for this CVE
🔍 How to Verify
Check if Vulnerable:
Check version using 'tmsh show sys version' and compare against affected versions
Check Version:
tmsh show sys version
Verify Fix Applied:
Verify version is patched using 'tmsh show sys version' and ensure it matches fixed versions
📡 Detection & Monitoring
Log Indicators:
- Unusual iControl REST requests
- Unexpected command execution logs
- Authentication bypass attempts
Network Indicators:
- Suspicious traffic to iControl REST endpoints
- Unexpected outbound connections from BIG-IP/BIG-IQ
SIEM Query:
source="bigip_logs" AND ("iControl" OR "REST" OR "unauthorized")
🔗 References
- http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html
- https://support.f5.com/csp/article/K03009991
- http://packetstormsecurity.com/files/162059/F5-iControl-Server-Side-Request-Forgery-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html
- https://support.f5.com/csp/article/K03009991
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22986