CVE-2021-23037

9.6 CRITICAL

📋 TL;DR

This is a reflected cross-site scripting (XSS) vulnerability in the BIG-IP Configuration utility that allows attackers to execute malicious JavaScript in the context of logged-in administrators. All BIG-IP users running affected versions are vulnerable. The vulnerability requires an attacker to trick an authenticated user into clicking a malicious link.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: 16.1.x, 16.0.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, 11.6.x
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIG-IP Configuration utility. Versions that have reached End of Technical Support (EoTS) are not evaluated but likely vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the BIG-IP system, allowing attacker to steal administrator credentials, modify configurations, create backdoors, or pivot to internal networks.

🟠

Likely Case

Session hijacking leading to unauthorized configuration changes, data exfiltration, or installation of malicious scripts.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and user awareness preventing successful social engineering.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users. The specific vulnerable page is undisclosed by F5.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in 17.0.0, 16.1.3.2, 16.0.1.3, 15.1.5.1, 14.1.4.6, 13.1.5, and later maintenance releases

Vendor Advisory: https://support.f5.com/csp/article/K21435974

Restart Required: Yes

Instructions:

1. Download appropriate patch from F5 Downloads. 2. Backup current configuration. 3. Apply patch following F5 upgrade procedures. 4. Restart BIG-IP system. 5. Verify fix and functionality.

🔧 Temporary Workarounds

Restrict Configuration Utility Access

all

Limit access to the Configuration utility to trusted networks only using firewall rules or network segmentation.

Implement Content Security Policy

all

Add CSP headers to prevent execution of unauthorized scripts.

🧯 If You Can't Patch

  • Implement strict network access controls to limit Configuration utility access to trusted IPs only
  • Enable multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version using 'tmsh show sys version' and compare against affected versions list

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify installed version is patched using 'tmsh show sys version' and confirm it's not in vulnerable range

📡 Detection & Monitoring

Log Indicators:

  • Unusual Configuration utility access patterns
  • Suspicious URL parameters in web logs
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • HTTP requests with suspicious JavaScript payloads in URL parameters
  • Traffic to Configuration utility from unexpected sources

SIEM Query:

source="bigip_logs" AND (url="*<script>*" OR url="*javascript:*" OR url="*onerror=*" OR url="*onload=*")

🔗 References

📤 Share & Export