CVE-2023-22374

8.5 HIGH

📋 TL;DR

A format string vulnerability in F5 BIG-IP's iControl SOAP interface allows authenticated attackers to crash the service or potentially execute arbitrary code. In appliance mode, successful exploitation can enable crossing security boundaries. This affects BIG-IP systems running vulnerable versions of iControl SOAP.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Multiple versions prior to patched releases (specific versions in vendor advisory)
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with iControl SOAP enabled. Software versions at End of Technical Support (EoTS) are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains remote code execution, potentially compromising the entire BIG-IP system and crossing security boundaries in appliance mode deployments.

🟠

Likely Case

Service disruption through denial of service by crashing the iControl SOAP CGI process, affecting management functionality.

🟢

If Mitigated

Limited to authenticated users only, with proper access controls reducing attack surface to authorized administrators.

🌐 Internet-Facing: HIGH if iControl SOAP is exposed to the internet, as authenticated attackers could exploit it remotely.
🏢 Internal Only: MEDIUM as it requires authenticated access, but internal attackers with credentials could still exploit it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to iControl SOAP interface. Format string vulnerabilities typically require specific knowledge of memory layout.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to F5 advisory K000130415 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000130415

Restart Required: Yes

Instructions:

1. Review F5 advisory K000130415. 2. Identify affected BIG-IP version. 3. Upgrade to patched version per F5 documentation. 4. Restart affected services.

🔧 Temporary Workarounds

Restrict iControl SOAP Access

all

Limit network access to iControl SOAP interface to trusted administrative networks only

Configure firewall rules to restrict access to iControl SOAP ports (typically 443)

Disable iControl SOAP if Unused

all

Disable the vulnerable iControl SOAP component if not required for operations

Consult F5 documentation for disabling iControl SOAP specific to your version

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BIG-IP management interfaces
  • Enforce strong authentication and limit administrative access to minimal required personnel

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version against affected versions listed in F5 advisory K000130415

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify BIG-IP version is updated to patched version specified in F5 advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected iControl SOAP process crashes
  • Suspicious format string patterns in SOAP requests

Network Indicators:

  • Unusual traffic patterns to iControl SOAP interface
  • Multiple failed authentication attempts followed by exploitation attempts

SIEM Query:

source="bigip_logs" AND (process="icontrol_soap" AND event="crash") OR (http_uri CONTAINS "%n" OR "%s" OR other format specifiers)

🔗 References

📤 Share & Export