CVE-2023-46747

CRITICAL KEV RANSOMWARE NUCLEI

BIG-IP - Auth Bypass

Title source: llm

Description

Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Exploits (13)

nomisec WORKING POC 206 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/CVE-2023-46747-RCE
nomisec WORKING POC 7 stars
by nvansluis · remote
https://github.com/nvansluis/test_cve-2023-46747
nomisec WORKING POC 4 stars
by Razzlemouse · poc
https://github.com/Razzlemouse/F5-BIG-IP-SmuggleShell-CVE-2023-46747-Exploit
nomisec WORKING POC 3 stars
by RevoltSecurities · remote
https://github.com/RevoltSecurities/CVE-2023-46747
nomisec WORKING POC 2 stars
by vidura2 · remote
https://github.com/vidura2/cve-2023-46747
nomisec WRITEUP 2 stars
by maniak-academy · poc
https://github.com/maniak-academy/Mitigate-CVE-2023-46747
nomisec WORKING POC
by cediegreyhat · remote
https://github.com/cediegreyhat/BigFinger
nomisec WORKING POC
by fu2x2000 · poc
https://github.com/fu2x2000/CVE-2023-46747
vulncheck_xdb WORKING POC
remote
https://github.com/Razzlemouse/F5-BIG-IP-CVE-2023-46747---Unauthenticated-RCE-Reverse-Shell-Nuclei-Template-Modified-
vulncheck_xdb WORKING POC
remote
https://github.com/wbohan/CVE
vulncheck_xdb WORKING POC
remote
https://github.com/MD-SEC/MDPOCS
metasploit WORKING POC EXCELLENT
by Michael Weber, Thomas Hendrickson, Sandeep Singh, Spencer McIntyre · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/f5_bigip_tmui_rce_cve_2023_46747.rb

Nuclei Templates (1)

F5 BIG-IP - Unauthenticated RCE via AJP Smuggling
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.title:"BIG-IP®-+Redirect" +"Server" || http.title:"big-ip®-+redirect" +"server"
FOFA: title="big-ip®-+redirect" +"server"

Scores

CVSS v3 9.8
EPSS 0.9444
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-10-31
VulnCheck KEV 2023-10-31
InTheWild.io 2023-10-31
ENISA EUVD EUVD-2023-50916
Ransomware Use Confirmed
CWE
CWE-306 CWE-288
Status published
Products (20)
f5/big-ip_access_policy_manager 13.1.0 - 13.1.5
f5/big-ip_advanced_firewall_manager 13.1.0 - 13.1.5
f5/big-ip_advanced_web_application_firewall 13.1.0 - 13.1.5
f5/big-ip_analytics 13.1.0 - 13.1.5
f5/big-ip_application_acceleration_manager 13.1.0 - 13.1.5
f5/big-ip_application_security_manager 13.1.0 - 13.1.5
f5/big-ip_application_visibility_and_reporting 13.1.0 - 13.1.5
f5/big-ip_automation_toolchain 13.1.0 - 13.1.5
f5/big-ip_carrier-grade_nat 13.1.0 - 13.1.5
f5/big-ip_container_ingress_services 13.1.0 - 13.1.5
... and 10 more
Published Oct 26, 2023
KEV Added Oct 31, 2023
Tracked Since Feb 18, 2026