F5 BIG-IP Bug Exposes Systems to Arbitrary Command Injection Attacks
F5 Networks has disclosed a high-severity command injection vulnerability affecting its BIG-IP products running in Appliance mode, tracked as CVE-2025-31644. The flaw, discovered in an undisclosed iControl REST endpoint and the BIG-IP TMOS Shell (tmsh) command set, allows authenticated attackers to bypass Appliance mode restrictions and execute arbitrary system commands.
Classified under CWE-78: Improper Neutralization of Special Elements in OS Commands, the vulnerability received a CVSS v3.1 score of 8.7 and CVSS v4.0 score of 8.5, both categorized as High severity.
According to F5’s security advisory, "This command injection vulnerability may allow an authenticated attacker to cross a security boundary and execute arbitrary Advanced Shell (bash) commands."
Affected Versions
The vulnerability impacts the following BIG-IP versions:
-
17.1.0 – 17.1.2
-
16.1.0 – 16.1.5
-
15.1.0 – 15.1.10
Root Cause: Vulnerable “save” Command
The issue was uncovered by security researcher Matei “Mal” Badanoiu of Deloitte, who found that the “file” parameter of the save
command is vulnerable to command injection. Attackers can manipulate this input using shell metacharacters to terminate legitimate operations and inject malicious commands.
A proof-of-concept exploit posted on GitHub shows how the injection can be carried out using the sequence \}; bash -c "id"
to confirm code execution as the root user.
Exploitation Requirements
To exploit this vulnerability, attackers must:
-
Have valid administrator credentials
-
Have network access to the vulnerable iControl REST endpoint or local access to the tmsh command
While exploitation is limited to authenticated admin users, the impact is critical, as it allows them to escalate privileges and execute unauthorized system-level commands.
Potential Impact
Successful exploitation could allow attackers to:
-
Execute arbitrary commands as root
-
Create or delete system files
-
Access internal network interfaces (self IPs)
-
Bypass Appliance mode protections
Importantly, F5 notes that the data plane is not affected—the exposure is limited to the control plane.
Mitigation and Patching
F5 has released security patches in the following versions:
-
17.1.2.2
-
16.1.6
-
15.1.10.7
Organizations should apply these updates immediately to mitigate risk.
Temporary Mitigation Options
For systems that can’t be patched right away, F5 recommends:
-
Blocking iControl REST access on self IPs (
Port Lockdown → Allow None
) -
Blocking iControl REST on the management interface
-
Restricting SSH access to trusted IPs only
-
Using packet filtering to limit access
However, F5 warns:
“As this attack is conducted by legitimate, authenticated administrator role users, there is no viable mitigation that also allows users access to the BIG-IP system. The only mitigation is to remove access for users who are not completely trusted.”
Final Recommendations
Organizations using F5 BIG-IP systems should:
-
Assess exposure immediately
-
Patch affected systems
-
Restrict access to trusted admins
-
Monitor for unusual admin activity
Given the potential for privilege escalation and system compromise, prompt action is essential to reduce risk.
Comments
Post a Comment