skout-blog

Cybersecurity Threat Advisory 0029-22: Threat Actors Targeting VoIP Providers with DDoS Attacks

Threat Update

F5 has released a set of vulnerabilities including 17 high and 1 critical which affect the users of BIG-IP application delivery controller. The vulnerabilities provides malicious actors the ability to deploy crypto mining, ransomware, or other malicious files to the internal network, as well as data theft of company data.  Barracuda MSP recommends applying the latest patches to F5’s products that are affected by the vulnerabilities.

Technical Detail & Additional Information

WHAT IS THE THREAT?

These vulnerabilities may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services, bypass appliance mode restrictions. They also allow an authenticated attacker with at least a “guest” role to exploit this vulnerability by storing malicious HTML or JavaScript code in the BIG-IP Configuration utility.

WHY IS IT NOTEWORTHY?

The 9.8 (critical severity) flaw tracked as CVE-2022-1388 allows undisclosed requests to possibly bypass iControl REST authentication. The high vulnerability CVE-2022-25946 and CVE-2022-27806, both scored an 8.7, allows a malicious actor to bypass Appliance mode restrictions due to a missing integrity check in F5 BIG-IP Guided Configuration. The third high vulnerability, CVE-2022-28707, rated at 8.0. It allows an attacker to execute JavaScript in the context of the currently logged-in user. The other high vulnerabilities allow for privilege escalation, DoS attacks, XSS attacks, bypassing security mechanisms, and executing arbitrary commands.

WHAT IS THE EXPOSURE OR RISK?

This set of vulnerabilities can be exploited for these widely used enterprise devices to gain initial access to networks and then spread laterally to other devices. This could lead to the deployment of crypto mining, ransomware, or other malicious files to the internal network, as well as theft of confidential or corporate data. Currently, these vulnerabilities are extremely easy to exploit, having the endpoint named “bash”, that some security researchers alluding to the fact this was corporate espionage.

WHAT ARE THE RECOMMENDATIONS?

Barracuda MSP recommends installing the patch released by F5 Immediately.

REFERENCES

For more in-depth information about the recommendations, please visit the following links:

If you have any questions, please contact our Security Operations Center.

Threat Advisory Sign Up