CVE-2022-25946
📋 TL;DR
This vulnerability allows authenticated administrators on F5 BIG-IP systems running in Appliance mode to bypass security restrictions due to a missing integrity check in Guided Configuration. It affects multiple BIG-IP products including Advanced WAF, ASM, and Guided Configuration across numerous versions. Attackers with administrative privileges can potentially escape the intended security boundaries of Appliance mode.
💻 Affected Systems
- F5 BIG-IP Advanced WAF
- F5 BIG-IP ASM
- F5 BIG-IP Guided Configuration
📦 What is this software?
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Advanced Web Application Firewall by F5
View all CVEs affecting Big Ip Advanced Web Application Firewall →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker with Administrator privileges could completely bypass Appliance mode restrictions, potentially gaining unauthorized access to underlying system components, modifying configurations, or accessing data that should be isolated.
Likely Case
Malicious administrators or compromised admin accounts could bypass security controls to perform unauthorized actions within the system, potentially leading to configuration changes, data access, or privilege escalation.
If Mitigated
With proper access controls and monitoring, the impact is limited to authorized administrators who would need to intentionally exploit the vulnerability, allowing for detection and response.
🎯 Exploit Status
Requires authenticated Administrator role access. The vulnerability is in the integrity check mechanism, making exploitation straightforward for authorized attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Guided Configuration 9.0 or later; BIG-IP versions with patches as specified in K52322100
Vendor Advisory: https://support.f5.com/csp/article/K52322100
Restart Required: Yes
Instructions:
1. Review K52322100 advisory for specific patch versions. 2. Download appropriate patches from F5 Downloads. 3. Apply patches following F5 upgrade procedures. 4. Restart affected services or systems as required.
🔧 Temporary Workarounds
Restrict Administrator Access
allLimit administrative access to only trusted personnel and implement strict access controls for Administrator roles.
Disable Guided Configuration if Unused
allIf Guided Configuration is not required for operations, consider disabling it to remove the attack surface.
🧯 If You Can't Patch
- Implement strict monitoring and logging of all administrative actions, especially those involving Guided Configuration
- Apply principle of least privilege to Administrator accounts and implement multi-factor authentication
🔍 How to Verify
Check if Vulnerable:
Check BIG-IP version with 'tmsh show sys version' and Guided Configuration version via management interface. Compare against affected versions listed in K52322100.
Check Version:
tmsh show sys version
Verify Fix Applied:
Verify BIG-IP is running patched version and Guided Configuration is 9.0 or later. Confirm Appliance mode restrictions are properly enforced.
📡 Detection & Monitoring
Log Indicators:
- Unusual administrative activity in Guided Configuration logs
- Attempts to modify Appliance mode settings
- Authentication events from unexpected Administrator accounts
Network Indicators:
- Unusual administrative traffic patterns to Guided Configuration services
SIEM Query:
source="bigip" AND (event_type="admin_activity" OR user_role="Administrator") AND (process="guided_config" OR action="bypass*")