CVE-2023-46747

CVE Published 2023-10-26
Related CWE(s) CWE-306: Missing Authentication for Critical Function, CWE-288: Authentication Bypass Using an Alternate Path or Channel
Related Vendor(s) f5
Related Product(s) big-ip_policy_enforcement_manager, big-ip_application_security_manager, big-ip_ssl_orchestrator, big-ip_websafe, big-ip_link_controller, big-ip_webaccelerator, big-ip_advanced_web_application_firewall, big-ip_access_policy_manager, big-ip_fraud_protection_services, big-ip_domain_name_system, big-ip_carrier-grade_nat, big-ip_global_traffic_manager, big-ip_automation_toolchain, big-ip_advanced_firewall_manager, big-ip_application_acceleration_manager, big-ip_local_traffic_manager, big-ip_analytics, big-ip_container_ingress_services, big-ip_application_visibility_and_reporting, big-ip_ddos_hybrid_defender
Exploitation Reported (CISA KEV) 2023-10-31
CVSS 3 Base Score 9.8 (CRITICAL)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector NETWORK

Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Threat Reports Related to CVE-2023-46747

Report

Bringing Access Back — Initial Access Brokers Exploit F5 BIG-IP (CVE-2023-46747) and ScreenConnect

This blog post by researchers at Mandiant describes how the threat actor UNC5174 exploited vulnerabilities in F5 BIG-IP appliances and Connectwise ...

Associated CAPEC Patterns

References