Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2023-130
Version:
1.0
Affected software:
F5 BIG-IP all modules
Type:
Authentication Bypass Using an Alternate Path or Channel
CVE/CVSS:
CVE-2023-46747CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
F5 BIG IP Advisory - https://my.f5.com/manage/s/article/K000137353
Vulnerability disclosure - https://www.praetorian.com/blog/advisory-f5-big-ip-rce/
CVE-2023-46747 is a critical authentication bypass vulnerability affecting instances of F5 BIG-IP that have the Traffic Management User Interface exposed to the internet.
A remote unauthenticated attacker could exploit this authentication bypass vulnerability to achieve remote code execution on the systems affected. The confidentiality, integrity and availability of information are impacted to the highest degree.
It is very likely that this vulnerability is actively exploited. This is based on data collected about previous vulnerabilities affecting F5 BIG-IP instances that were similar in nature.
F5 BIG-IP is a collection of hardware platforms and software solutions providing services focused on security, reliability, and performance.
On the 25th of October Praetorian released an technical advisory detailing a critical vulnerability in F5 BIG-IP systems that have the Traffic Management User Interface (TMUI) exposed to the internet.
CVE-2023-46747 is an authentication bypass vulnerability. This is accomplished by sending undisclosed http requests to /tmui endpoints which are then forwarded to the Apache Jserv Protocol. This AJP is then used to trigger request smuggling to deliver a malicious payload.
The TMUI is the same interface that was affected by CVE-2020-5902, a critical remote code execution that was actively exploited. The technique CWE-288 used for exploiting CVE-2023-46747 is the same technique used by CVE-2022-26377 which enables request smuggling through the AJP server.
F5 has published and advisory on the 26th of October detailing the vulnerability and which actions to take. The link to the F5 advisory is included in the sources.
Affected products
BIG-IP ( all modules):
The Centre for Cyber Security Belgium strongly recommends system administrators to install the patched versions of this software.
Upgrade
Mitigate/workaround
One of the mitigations below will prove effective.
Monitor/Detect
The CCB recommends organizations to upscale monitoring and detection capabilities and to detect any related suspicious activity, ensuring a fast response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.
NVD - CVE-2023-46747