F5 BIG-IP Bug Exposes Systems to Arbitrary Command Injection Attacks

 F5 Networks has disclosed a high-severity command injection vulnerability affecting its BIG-IP products running in Appliance mode, tracked as CVE-2025-31644. The flaw, discovered in an undisclosed iControl REST endpoint and the BIG-IP TMOS Shell (tmsh) command set, allows authenticated attackers to bypass Appliance mode restrictions and execute arbitrary system commands.  


Classified under CWE-78: Improper Neutralization of Special Elements in OS Commands, the vulnerability received a CVSS v3.1 score of 8.7 and CVSS v4.0 score of 8.5, both categorized as High severity.

According to F5’s security advisory, "This command injection vulnerability may allow an authenticated attacker to cross a security boundary and execute arbitrary Advanced Shell (bash) commands."

Affected Versions

The vulnerability impacts the following BIG-IP versions:

  • 17.1.0 – 17.1.2

  • 16.1.0 – 16.1.5

  • 15.1.0 – 15.1.10

Root Cause: Vulnerable “save” Command

The issue was uncovered by security researcher Matei “Mal” Badanoiu of Deloitte, who found that the “file” parameter of the save command is vulnerable to command injection. Attackers can manipulate this input using shell metacharacters to terminate legitimate operations and inject malicious commands.

A proof-of-concept exploit posted on GitHub shows how the injection can be carried out using the sequence \}; bash -c "id" to confirm code execution as the root user.


Exploitation Requirements

To exploit this vulnerability, attackers must:

  • Have valid administrator credentials

  • Have network access to the vulnerable iControl REST endpoint or local access to the tmsh command

While exploitation is limited to authenticated admin users, the impact is critical, as it allows them to escalate privileges and execute unauthorized system-level commands.

Potential Impact

Successful exploitation could allow attackers to:

  • Execute arbitrary commands as root

  • Create or delete system files

  • Access internal network interfaces (self IPs)

  • Bypass Appliance mode protections

Importantly, F5 notes that the data plane is not affected—the exposure is limited to the control plane.

Mitigation and Patching

F5 has released security patches in the following versions:

  • 17.1.2.2

  • 16.1.6

  • 15.1.10.7

Organizations should apply these updates immediately to mitigate risk.

Temporary Mitigation Options

For systems that can’t be patched right away, F5 recommends:

  • Blocking iControl REST access on self IPs (Port Lockdown → Allow None)

  • Blocking iControl REST on the management interface

  • Restricting SSH access to trusted IPs only

  • Using packet filtering to limit access

However, F5 warns:

“As this attack is conducted by legitimate, authenticated administrator role users, there is no viable mitigation that also allows users access to the BIG-IP system. The only mitigation is to remove access for users who are not completely trusted.”

Final Recommendations

Organizations using F5 BIG-IP systems should:

  • Assess exposure immediately

  • Patch affected systems

  • Restrict access to trusted admins

  • Monitor for unusual admin activity

Given the potential for privilege escalation and system compromise, prompt action is essential to reduce risk.

Comments

Popular posts from this blog

The Hidden Lag Killing Your SIEM Efficiency

Critical Vulnerability in Veeam Backup & Replication Exposes Enterprises to Remote Code Execution

CISA and ENISA enhance their Cooperation