ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

F5 BIG-IP Exploit - CVE-2022-1388

Risk Factors

This vulnerability is well known, and public exploit code is available. Management ports on BIG-IP devices are not typically exposed to the internet, requiring an attacker to access unpatched internal BIG-IP devices. A successful exploit can enable an attacker to gain control of a device by running arbitrary commands.

Category

Exploitation
Detection diagram
Next in Exploitation: F5 BIG-IP Exploit Attempt - CVE-2023-46747

Attack Background

The iControl REST API helps administrators manage an F5 BIG-IP server. An unauthenticated attacker with network access to an iControl management interface can bypass authentication to access BIG-IP systems by manipulating HTTP request headers. The attacker sends an HTTP POST request with an arbitrary, malicious command to a restricted management REST API endpoint (such as mgmt/tm/util/bash). The victim responds with a confirmation that the command was processed.

Mitigation Options

Upgrade to BIG-IP versions 13.1.5, 14.1.4.6, 15.1.5.1, 16.1.2.2, or 17.0.0
If unable to upgrade, refer to KB23605346 for instructions about blocking iControl REST access through the self IP address, blocking iControl REST access through the management interface, and modifying the BIG-IP httpd configuration.

MITRE ATT&CK ID

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?