CVE-2023-45226

7.4 HIGH

📋 TL;DR

CVE-2023-45226 involves hardcoded credentials in F5 BIG-IP SPK TMM debug containers that could allow attackers to impersonate SSH servers when SSH debug mode is enabled. This affects organizations running vulnerable BIG-IP SPK versions with debug features activated. The vulnerability requires both vulnerable software and specific debug configuration to be exploitable.

💻 Affected Systems

Products:
  • F5 BIG-IP SPK (Service Proxy for Kubernetes)
Versions: Specific versions not publicly detailed in advisory; refer to F5 K000135874 for exact affected versions
Operating Systems: Linux (containerized environment)
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SSH debug is explicitly enabled on f5-debug-sidecar and f5-debug-sshd containers. End-of-Technical-Support versions are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain unauthorized SSH access to debug containers, potentially leading to container compromise, lateral movement within the SPK environment, and interception of sensitive traffic.

🟠

Likely Case

Limited impact since exploitation requires SSH debug to be enabled, which is not a default configuration. Most likely scenario involves targeted attacks against misconfigured systems.

🟢

If Mitigated

With SSH debug disabled (default), the vulnerability is not exposed and presents minimal risk.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to intercept traffic and SSH debug to be enabled. Credentials are hardcoded but specific details are not public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to F5 advisory K000135874 for fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000135874

Restart Required: Yes

Instructions:

1. Review F5 advisory K000135874 for affected versions
2. Upgrade to patched versions specified in advisory
3. Restart affected containers/services
4. Verify SSH debug is disabled unless absolutely required

🔧 Temporary Workarounds

Disable SSH Debug

linux

Disable SSH debug functionality on f5-debug-sidecar and f5-debug-sshd containers to eliminate exposure

# Disable SSH debug in container configuration
# Refer to F5 documentation for specific container configuration changes

🧯 If You Can't Patch

  • Ensure SSH debug is disabled on all containers
  • Implement network segmentation to restrict access to debug containers
  • Monitor for unauthorized SSH access attempts to debug containers

🔍 How to Verify

Check if Vulnerable:

Check if running affected BIG-IP SPK versions and verify if SSH debug is enabled on f5-debug-sidecar/f5-debug-sshd containers

Check Version:

# Check BIG-IP SPK version
kubectl get pods -n <namespace> -l app=<spk-app> -o jsonpath='{.items[*].spec.containers[*].image}'

Verify Fix Applied:

Verify upgraded to patched version from F5 advisory and confirm SSH debug is disabled

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized SSH login attempts to debug containers
  • SSH debug container startup logs
  • Authentication failures with hardcoded credential patterns

Network Indicators:

  • Unexpected SSH traffic to debug container ports
  • Traffic interception patterns targeting debug containers

SIEM Query:

source="container_logs" AND ("f5-debug-sshd" OR "f5-debug-sidecar") AND ("authentication" OR "ssh")

🔗 References

📤 Share & Export