CVE-2021-23012

8.2 HIGH

📋 TL;DR

This vulnerability allows authenticated users with Resource Administrator or Administrator roles on affected BIG-IP systems to execute arbitrary bash commands due to insufficient input validation in system support functionality. This could lead to complete system compromise. Affected versions include BIG-IP 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, 14.1.x before 14.1.4, and 13.1.x before 13.1.4.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: 16.0.x before 16.0.1.1, 15.1.x before 15.1.3, 14.1.x before 14.1.4, 13.1.x before 13.1.4
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Resource Administrator or Administrator role access. Versions that have reached End of Technical Support are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root-level access, data exfiltration, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation from Resource Administrator to full system control, configuration manipulation, and credential theft.

🟢

If Mitigated

Limited to authorized administrative users only, but still allows privilege boundary bypass within administrative roles.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific administrative privileges. The vulnerability is in system support functionality with insufficient input validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.0.1.1, 15.1.3, 14.1.4, 13.1.4

Vendor Advisory: https://support.f5.com/csp/article/K04234247

Restart Required: Yes

Instructions:

1. Download appropriate patch version from F5 Downloads. 2. Backup current configuration. 3. Apply patch using F5 upgrade procedures. 4. Reboot system as required. 5. Verify version after reboot.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit Resource Administrator and Administrator role assignments to only essential personnel. Implement strict access controls and monitoring for these roles.

Network Segmentation

all

Isolate BIG-IP management interfaces from general network access. Restrict access to specific trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict role-based access control and monitor all administrative user activities
  • Segment BIG-IP management interfaces and restrict access to specific trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version via GUI (System > Platform) or CLI (tmsh show sys version). Compare against affected versions list.

Check Version:

tmsh show sys version | grep Version

Verify Fix Applied:

Verify version is 16.0.1.1 or higher, 15.1.3 or higher, 14.1.4 or higher, or 13.1.4 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual bash command execution in system logs
  • Unexpected administrative user activity in support functionality
  • Commands with special characters in system support operations

Network Indicators:

  • Unusual outbound connections from BIG-IP management interfaces
  • Traffic patterns inconsistent with normal administrative operations

SIEM Query:

source="bigip" AND ("bash" OR "command" OR "exec") AND user_role="administrator" OR user_role="resource_admin"

🔗 References

📤 Share & Export