CVE-2026-22549

4.9 MEDIUM

📋 TL;DR

This vulnerability in F5 BIG-IP Container Ingress Services allows excessive permissions that could enable reading Kubernetes cluster secrets. It affects organizations running vulnerable versions of F5 BIG-IP Container Ingress Services in Kubernetes environments.

💻 Affected Systems

Products:
  • F5 BIG-IP Container Ingress Services
Versions: Specific versions not detailed in provided reference; consult F5 advisory K000157960 for exact affected versions
Operating Systems: Linux (Kubernetes environments)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects supported versions; EoTS versions are not evaluated. Requires Kubernetes cluster environment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive Kubernetes secrets including API tokens, certificates, and credentials, potentially leading to cluster compromise and lateral movement.

🟠

Likely Case

Unauthorized access to cluster secrets could expose sensitive configuration data and credentials, enabling further reconnaissance or privilege escalation.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the specific container ingress service instance.

🌐 Internet-Facing: MEDIUM - While the service may be internet-facing, exploitation typically requires some level of access to the Kubernetes environment.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this to access sensitive cluster secrets.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some level of access to the Kubernetes environment or the container ingress service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to F5 advisory K000157960 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000157960

Restart Required: Yes

Instructions:

1. Review F5 advisory K000157960 for affected versions. 2. Upgrade to patched version per F5 documentation. 3. Restart container ingress services. 4. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Restrict Access Controls

all

Implement strict RBAC and network policies to limit access to container ingress services

Secret Management Hardening

linux

Use Kubernetes secrets encryption at rest and limit secret access to minimum required services

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate container ingress services from sensitive cluster resources
  • Enforce least privilege access controls and audit all access to container ingress services

🔍 How to Verify

Check if Vulnerable:

Check F5 BIG-IP Container Ingress Services version against affected versions listed in advisory K000157960

Check Version:

kubectl get pods -n <namespace> -l app=<ingress-service> -o jsonpath='{.items[*].spec.containers[*].image}'

Verify Fix Applied:

Verify version is updated to patched version and test that excessive permissions are no longer present

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Kubernetes secrets API
  • Multiple failed then successful secret access attempts from container ingress services

Network Indicators:

  • Unexpected outbound connections from container ingress services to Kubernetes API server

SIEM Query:

source="kubernetes-audit" AND verb="get" AND resource="secrets" AND userAgent CONTAINS "container-ingress"

🔗 References

📤 Share & Export