F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability
Summary
| CVE | CVE-2023-46747 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-26 21:15:00 UTC |
| Updated | 2024-02-01 02:15:00 UTC |
| Description | Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated |
Risk And Classification
EPSS: 0.944360000 probability, percentile 0.999860000 (date 2026-04-03)
CISA KEV: Listed on 2023-10-31; due 2023-11-21; ransomware use Known
Problem Types: CWE-306
CISA Known Exploited Vulnerability
| Vendor | F5 |
|---|---|
| Product | BIG-IP Configuration Utility |
| Name | F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability |
| Required Action | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
| Notes | https://my.f5.com/manage/s/article/K000137353; https://nvd.nist.gov/vuln/detail/CVE-2023-46747 |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.secpod.com/blog/f5-issues-warning-big-ip-vulnerability-used-in-active-ex... | www.secpod.com | ||
| myF5 | MISC | my.f5.com | |
| packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Exec... | packetstormsecurity.com | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 378976 F5 BIG-IP Unauthenticated Remote Code Execution (RCE) Vulnerability (K000137353,K000137365)