Cyber Security

New F5 Next-Gen Manager Flaw Let Attackers Take Full Admin Control

F5 Big IP has been discovered with two critical vulnerabilities that could potentially allow a threat actor to take full administrative control of the device and create accounts on any F5 assets. 

In fact, these attacker-created accounts will be invisible even from the Next Central Manager, making them persistent access to the environment that can be utilized for multiple malicious activities.

These vulnerabilities have been assigned with CVE-2024-21793 and CVE-2024-26026. The severity for these vulnerabilities has been given as 7.5 (High).

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

Moreover, F5 confirmed that there has been no indication of exploitation by threat actors in the wild. F5 has released patches for these vulnerabilities alongside security advisories.

New F5 Next-Gen Manager Flaw

According to the reports shared with Cyber Security News, the researchers submitted 5 vulnerabilities, of which only two were addressed by F5, and the other 3 are still being researched. 

Big IP Next (Source: Eclypsium)

Threat actors have been consistently exploiting networking and application infrastructure for quite a while now because these highly privileged systems can give them several ways to gain access, spread, and maintain persistence within an environment.

The Next Central Manager is a single, centralized point of control for performing all life cycle-related tasks across BIG-IP. 

CVE-2024-21793: Unauthenticated OData Injection

This vulnerability exists in the Central Manager due to the method it handles OData queries.

It could allow a threat actor to inject malicious OData query into the Central manager and leak sensitive information like admin password hash that could in-turn provide elevated privileges. 

However, for this vulnerability to exist, the LDAP must be enabled on the Central Manager. 

CVE-2024-26026: Unauthenticated SQL Injection

This is an SQL injection vulnerability in the Next Central Manager that could exist in any device configuration, potentially allowing a threat actor to bypass authentication.

However, this vulnerability can also be used to extract administrative user hash on vulnerable devices.

Apart from these two vulnerabilities, which have been assigned a CVE, the other 3 unassigned vulnerabilities were 

  • Undocumented API allows SSRF of URL path to Call Any Device Method – this SSRF vulnerability can call any API method and create invisible on-board accounts
  • Inadequate Bcrypt cost of 6 – Central manager hashes admin password with only a cost of 6 that is not sufficient as per modern recommendations. This can be brute-forced by a well-funded attacker with approximately ~$50k.

Admin Password Self-Reset without Previous Password Knowledge – A logged-in Administrative user can reset their password without even knowing the previous password. If combined with the other vulnerabilities mentioned above, this could

Combining Vulnerabilities (Source: Eclypsium)

Eclypsium has published a Proof of concept for each vulnerability. It is recommended that users upgrade F5 assets to the latest versions in order to patch these security issues.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

Eswar

Eswar is a Cyber security reporter with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is reporting data breach, Privacy and APT Threats.

Recent Posts

10 Best VPN for HIPAA Compliance In 2024

In healthcare, strict adherence to the Health Insurance Portability and Accountability Act (HIPAA) is essential,…

2 hours ago

Launch Your Non-Technical Cybersecurity Career with GRC Mastery

Are you ready to break into the exciting world of cybersecurity but lack a technical…

4 hours ago

Vultur Malware Mimic As Mobile Antivirus Steals Login Credentials

Malware typically mimics mobile antivirus applications to trick users into installing the mimicked AV app,…

6 hours ago

Samstealer Attacking Windows Systems To Steal Sensitive Data

Hackers mainly aim at Windows systems as they are widely adopted and dominate the market,…

6 hours ago

Hackers Exploited GitHub and FileZilla to Deliver Banking Malware

The Insikt Group at Recorded Future has found a sophisticated cybercrime operation run by Russian-speaking…

7 hours ago

Antidot Mobile Malware As Google Play Update Hijacks Device Control

Cybersecurity experts have found a new banking Trojan horse for Android smartphones. It's called Antidot.…

8 hours ago