DETECTION OVERVIEW
Risk Factors
F5 BIG-IP devices are typically internet-facing and this vulnerability has been exploited by threat actors. Public exploit code is available, enabling unauthenticated attackers to gain full administrator privileges, control of a BIG-IP device, and launch additional attacks on the network.
Category

BIG-IP is a collection of hardware and software solutions that direct traffic across a network. BIG-IP appliances provide a Configuration Utility web interface known as the Traffic Management User Interface (TMUI). TMUI forwards HTTP requests over the Apache JServe Protocol (AJP). A request smuggling vulnerability in the TMUI will mishandle HTTP requests sent between an Apache HTTP front-end server and an AJP back-end server, leading to authentication bypass. To exploit this vulnerability, the attacker creates an HTTP POST request with a manipulated Transfer-Encoding header, a malicious AJP message in the POST body, and a URL with /tmui/login.jsp. The TMUI forwards the POST request and the smuggled AJP message to the back-end server for processing, which interprets the AJP message in the POST body as another forwarded POST request. After a successful exploit, the attacker can chain together multiple requests to eventually send an HTTP POST request to the /mgmt/tm/util/bash endpoint, which leads to remote code execution.
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
