CVE-2022-41800
HIGH EXPLOITED NUCLEIBIG-IP - Auth Bypass
Title source: llmDescription
In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Exploits (2)
metasploit
WORKING POC
EXCELLENT
by Ron Bowes · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/f5_icontrol_rpmspec_rce_cve_2022_41800.rb
Nuclei Templates (1)
F5 BIG-IP Appliance Mode - Command Injection
HIGHVERIFIEDby dwisiswant0
Shodan:
http.title:"big-ip®-+redirect" +"server" || http.html:"big-ip apm"
FOFA:
body="big-ip apm" || title="big-ip®-+redirect" +"server"
Scores
CVSS v3
8.7
EPSS
0.9268
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Details
VulnCheck KEV
2023-12-13
CWE
CWE-77
Status
published
Products (21)
f5/big-ip_access_policy_manager
17.0.0
f5/big-ip_access_policy_manager
13.1.0 - 13.1.5
f5/big-ip_advanced_firewall_manager
13.1.0 - 17.0.0
f5/big-ip_analytics
17.0.0
f5/big-ip_analytics
13.1.0 - 13.1.5
f5/big-ip_application_acceleration_manager
17.0.0
f5/big-ip_application_acceleration_manager
13.1.0 - 13.1.5
f5/big-ip_application_security_manager
17.0.0
f5/big-ip_application_security_manager
13.1.0 - 13.1.5
f5/big-ip_domain_name_system
17.0.0
... and 11 more
Published
Dec 07, 2022
Tracked Since
Feb 18, 2026