logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Multiple F5 Vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 6, 2023
    Rewterz
    March 6, 2023
    Rewterz Threat Advisory – CVE-2023-27290 – IBM Observability with Instana missing Vulnerability
    Severity High Analysis Summary CVE-2023-27290 Docker based datastores for IBM Instana (IBM Observability with Instana 239-0 through 239-2, 241-0 through 241-2, and 243-0) do not currently […]
    March 5, 2023
    Rewterz
    March 5, 2023
    Rewterz Threat Alert – SmokeLoader Malware – Active IOCs
    Severity Medium Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
    March 5, 2023
    Rewterz
    March 5, 2023
    Rewterz Threat Alert – Cobalt Strike Malware – Active IOCs
    Severity Medium Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Multiple F5 Vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 6, 2023
    Rewterz
    March 6, 2023
    Rewterz Threat Advisory – CVE-2023-27290 – IBM Observability with Instana missing Vulnerability
    Severity High Analysis Summary CVE-2023-27290 Docker based datastores for IBM Instana (IBM Observability with Instana 239-0 through 239-2, 241-0 through 241-2, and 243-0) do not currently […]
    March 5, 2023
    Rewterz
    March 5, 2023
    Rewterz Threat Alert – SmokeLoader Malware – Active IOCs
    Severity Medium Analysis Summary Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the […]
    March 5, 2023
    Rewterz
    March 5, 2023
    Rewterz Threat Alert – Cobalt Strike Malware – Active IOCs
    Severity Medium Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Alert – Quasar RAT – Active IOCs
May 5, 2022
Rewterz
Rewterz Threat Advisory – Node.js dexie module and sqlite3 module Vulnerabilities
May 5, 2022

Rewterz Threat Advisory – Multiple F5 Vulnerabilities

May 5, 2022

Severity

High

Analysis Summary

CVE-2022-25946 CVSS:8.7

F5 BIG-IP (Advanced WAF, APM, ASM) and Guided Configuration (GC) could allow a remote authenticated attacker to bypass security restrictions, caused by the missing of integrity check. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass Appliance mode restrictions.

CVE-2022-25990 CVSS:5.3

F5 F5OS-A could allow a remote attacker to obtain sensitive information, caused by an unspecified flaw. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain the Docker registry information, and use this information to launch further attacks against the affected system.

CVE-2022-27189 CVSS:7.5

F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when an Internet Content Adaptation Protocol (ICAP) profile is configured on a virtual server. By sending a specially-crafted traffic, a remote attacker could exploit this vulnerability to cause the Traffic Management Microkernel (TMM) memory resource utilization to increase, and results in a denial of service condition

CVE-2022-27230 CVSS:7.5

F5 BIG-IP Guided Configuration and APM are vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

CVE-2022-28691 CVSS:7.5


F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when a Real Time Streaming Protocol (RTSP) profile is configured on a virtual server. By sending a specially-crafted traffic, a remote attacker could exploit this vulnerability to cause the Traffic Management Microkernel (TMM) memory resource utilization to increase, and results in a denial of service condition.

CVE-2022-28705 CVSS:7.5

F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when an ePVA and the pva.fwdaccel BigDB variable enabled. By sending specially-crafted requests, a remote attacker could exploit this vulnerability to cause the Traffic Management Microkernel (TMM) process to terminate, and results in a denial of service condition

CVE-2022-28716 CVSS:7.5


F5 BIG-IP (AFM, CGNAT, PEM) are vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

CVE-2022-29491 CVSS:7.5


F5 BIG-IP (LTM, Advanced WAF, ASM, APM) are vulnerable to a denial of service, caused by a flaw when a virtual server is configured with HTTP, TCP on one side, and DTLS on the other. By sending specially-crafted requests, a remote attacker could exploit this vulnerability to cause the Traffic Management Microkernel (TMM) process to terminate, and results in a denial of service condition.

CVE-2022-26372 CVSS:7.5


F5 BIG-IP is vulnerable to a denial of service, caused by a flaw when a DNS listener is configured on a virtual server with DNS queueing. By sending specially-crafted requests, a remote attacker could exploit this vulnerability to cause an increase in memory resource utilization, and results in a denial of service condition.

CVE-2022-26415 CVSS:7.7

F5 BIG-IP could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in an undisclosed iControl REST endpoint. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass Appliance mode restrictions.

CVE-2022-27806 CVSS:8.7

F5 BIG-IP could allow a remote authenticated attacker to bypass security restrictions, caused by a command injection flaw in undisclosed URIs. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass Appliance mode restrictions.

CVE-2022-28707 CVSS:8

F5 BIG-IP is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

CVE-2022-29263 CVSS:7.8

F5 BIG-IP APM and APM Clients could allow a local authenticated attacker to gain elevated privileges on the system, caused not using best practice for saving temporary files by the Client Component Installer Service. By sending a specially-crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges.

CVE-2022-1388 CVSS:9.8

F5 BIG-IP could allow a remote attacker to execute arbitrary commands on the system, caused by improper input validation. By sending specially-crafted requests to the management port and/or self IP addresses, an attacker could exploit this vulnerability to execute arbitrary commands, create or delete files, or disable services on the system.

Impact

  • Security Bypass
  • Information Disclosure
  • Denial of Service
  • Cross-Site Scripting
  • Privilege Escalation

Indicators Of Compromise

CVE

  • CVE-2022-25946
  • CVE-2022-25990
  • CVE-2022-27189
  • CVE-2022-27230
  • CVE-2022-28691
  • CVE-2022-28705
  • CVE-2022-29491
  • CVE-2022-26372
  • CVE-2022-26415
  • CVE-2022-27806
  • CVE-2022-28707
  • CVE-2022-29263
  • CVE-2022-1388

Affected Vendors

  • F5

Affected Products

  • F5 BIG-IP (APM) 14.1.0
  • F5 BIG-IP (ASM) 14.1.0
  • F5 BIG-IP (APM) 15.1.0
  • F5 BIG-IP (ASM) 15.1.0
  • F5 F5OS-A 1.0.0
  • F5 BIG-IP 11.6.1
  • F5 BIG-IP 13.1.0
  • F5 BIG-IP 14.1.0
  • F5 BIG-IP 11.6.5
  • F5 BIG-IP (APM) 14.1.4
  • F5 BIG-IP (APM) 16.1.0
  • F5 BIG-IP 15.1.0
  • F5 BIG-IP 14.1.4
  • F5 BIG-IP (AFM) 15.1.0
  • F5 BIG-IP (PEM) 15.1.0
  • F5 BIG-IP (PEM) 14.1.0
  • F5 BIG-IP (PEM) 13.1.0
  • F5 BIG-IP (APM) 12.1.0
  • F5 BIG-IP (APM) 13.1.0
  • F5 BIG-IP 12.1.0
  • F5 BIG-IP APM Clients 7.1.8

Remediation

Refer to F5 Security Advisory for patch, upgrade or suggested workaround information.

CVE-2022-25946
CVE-2022-25990
CVE-2022-27189 
CVE-2022-27230 
CVE-2022-28691 
CVE-2022-28705 
CVE-2022-29491 
CVE-2022-26372 
CVE-2022-26415 
CVE-2022-27806 

CVE-2022-28707 
CVE-2022-29263 
CVE-2022-1388

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo