F5 Big-IP RCE Vulnerability Explained (CVE-2022-1388)

What happened?

A few days after the company F5 released patches for a remote code execution vulnerability impacting its BIG-IP products, a working proof of concept (POC) was discovered, CVE 2022-1388. Security engineers reverse-engineered the F5 patch to uncover the vulnerability. As shown in the image below, exploiting this vulnerability only requires sending a POST request with a specially-crafted payload. 

Malicious actors have already weaponized this exploit and it is actively being exploited. We highly recommend patching as soon as possible.

What products are affected?

This vulnerability impacts the following versions of BIG-IP products:

  • 16.1.0 - 16.1.2
  • 15.1.0 - 15.1.5
  • 14.1.0 - 14.1.4
  • 13.1.0 - 13.1.4
  • 12.1.0 - 12.1.6
  • 11.6.1 - 11.6.5

Is there a mitigation patch or update?

Fixes are available in versions 17.0.0, 16.1.2.2, 15.1.5.1, 14.1.4.6, and 13.1.5

Think you’ve been exposed?

If you think you may be at risk of this CVE, you need to have a scan run ASAP to confirm. Red Sentry’s exploit engine can perform a proof of concept to confirm your vulnerability status. Reach out today for a free F5 Big-IP (CVE 2022-1388) scan. 

Alex Thomas
CTO, Founder
Alex started his career as an ethical hacker, eventually working as a penetration tester, hacking into fortune 500 companies all day long. Alex invented the Red Sentry software platform, a tool that could help people take action before they were victim to a hack. Pairing this software with a team of seasoned pentesters, Red Sentry has created a hybrid approach that allows businesses to get a thorough manual pentest quickly, while also utilizing the Red Sentry software, to ensure year around security.

Schedule a Pentest:

Penetration Testing

Start a Free Trial:

Vulnerability Scanner