CVE-2022-23013

8.8 HIGH

📋 TL;DR

This DOM-based cross-site scripting (XSS) vulnerability in BIG-IP DNS & GTM Configuration utility allows attackers to execute malicious JavaScript in the context of a logged-in administrator. Affected users include organizations running vulnerable BIG-IP DNS/GTM versions 11.6.x through 16.x, with the highest risk to those with internet-facing management interfaces.

💻 Affected Systems

Products:
  • F5 BIG-IP DNS
  • F5 BIG-IP GTM
Versions: 16.x before 16.1.0, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, all versions of 13.1.x, 12.1.x, and 11.6.x
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BIG-IP DNS and GTM modules. Software versions that have reached End of Technical Support (EoTS) are not evaluated but likely vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of BIG-IP system leading to credential theft, configuration modification, lateral movement to internal networks, and potential data exfiltration.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized configuration changes to DNS/GTM settings.

🟢

If Mitigated

Limited impact due to network segmentation, strong access controls, and proper authentication mechanisms.

🌐 Internet-Facing: HIGH - Internet-facing Configuration utility allows remote attackers to exploit without internal access.
🏢 Internal Only: MEDIUM - Requires attacker to have internal network access or compromised internal host.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires attacker to lure authenticated user to malicious page. DOM-based XSS typically requires user interaction but can be automated via phishing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.1.0, 15.1.4, 14.1.4.4

Vendor Advisory: https://support.f5.com/csp/article/K29500533

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate patch from F5 Downloads. 3. Upload and install via Configuration utility or CLI. 4. Reboot system as required. 5. Verify patch installation.

🔧 Temporary Workarounds

Restrict Configuration Utility Access

all

Limit access to Configuration utility to trusted IP addresses only

Configure firewall rules to restrict access to BIG-IP management IP/ports

Enable Content Security Policy

all

Implement CSP headers to mitigate XSS impact

Add Content-Security-Policy headers via iRules or web server configuration

🧯 If You Can't Patch

  • Isolate BIG-IP management interface to separate VLAN with strict access controls
  • Implement multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version via Configuration utility (System > Platform) or CLI command

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify installed version matches patched versions: 16.1.0+, 15.1.4+, or 14.1.4.4+

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution in Configuration utility logs
  • Multiple failed login attempts followed by successful login from unusual location

Network Indicators:

  • Unexpected outbound connections from BIG-IP management interface
  • Suspicious HTTP requests to Configuration utility with script tags

SIEM Query:

source="bigip_audit.log" AND ("script" OR "javascript" OR "onload=" OR "onerror=")

🔗 References

📤 Share & Export