QID 376787

Date Published: 2022-08-10

QID 376787: F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) Icontrol Rest Vulnerability cve-2022-35728 (K55580033)

An authenticated user's iControl REST token may remain valid for a limited time after logging out from the Configuration utility. CVE-2022-35728

Vulnerable Component: BIG-IP ASM,LTM,APM

Affected Versions:
17.0.0
16.1.0 - 16.1.3
15.1.0 - 15.1.6
14.1.0 - 14.1.5
13.1.0 - 13.1.5

QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.

A remote unauthenticated attacker may be able to reuse, for a limited time, an authenticated user's iControl REST token generated from the Configuration utility and access through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    For more information about patch details please refer to K55580033
    Vendor References

    CVEs related to QID 376787

    Software Advisories
    Advisory ID Software Component Link
    K55580033 URL Logo support.f5.com/csp/article/K55580033