F5 Big IP opens up vulnerability during configuration
.png)
F5 Networks’ popular load balancing software BIG-IP harbours a vulnerability that could let malicious code seep in using just an online form.
"Load balancing is an important web management process that keeps many internet services ticking," said F-Secure, which spotted the vulnerability. "Without it, banks, governments, and other organisations providing online services to large numbers of people would struggle to keep their websites running."
Senior security consultant Christoffer Jerkeby discovered the vulnerability during a routine assessment. More than 300,000 organisations including state bodies and large banks use BIG-IP, broadening the scope of potential damages.
"Further research found that, following a successful exploit, an adversary could turn the compromised device back against the organisation or even individuals using the affected services," it added.
F-Secure said it is yet to receive reports of misuse of this vulnerability.
"F5 is a popular technology and we found over 300,000 (potentially vulnerable) devices on-line. Google and services like Shodan can be used to search for these also. The F5 website also contains information on their clients and sectors," Dave Hartley, technical director at F-Secure, told SC Media UK.
He refrained from revealing the names of the vulnerable F5 clients, saying: "These companies may be at risk of compromise."
Curiously, BIG-IP itself is immune to the vulnerability. It creeps up only when an organisation mis-configures BIG-IP’s iRules, the procedures written in tool command language (Tcl) to direct incoming web traffic toward the correct web server.
"These iRules are created using the tool command language (Tcl). Certain coding practices that may seem perfectly functional and practical to an organisation can allow an attacker to inject arbitrary Tcl commands, which could be executed in the security context of the target Tcl script," the report said.
In some implementations of BIG-IP, injecting a malicious code can be as easy as filling an online form, F-Secure revealed.
The threat posed is way bigger than a simple data breach, Hartley told SC Media UK. "An attacker can leverage the issue to achieve much more than a data breach alone. If the prerequisites are met, it could result in an adversary taking full control of the F5."
However, the scope and depth of the attack will vary, depending on the objective of the attacker and the scale of operations of the target organisation, he said.
"The F5 is often used for perimeter security and traffic management and there have been issues identified in similar technologies in the past that have had a severe impact for some -- firewalls, anti-virus, e-mail sandbox technologies etc.," he explained.
Addressing the issue, F5 released a public advisory.
"This is not a vulnerability in Tcl, or F5 products, but rather an issue relating to coding practices used when writing Tcl code. As with most programming or scripting languages, it is possible to write code in a way that may create vulnerabilities. This is not something F5 can prevent the user from doing, as the issue does not lend itself to neither deterministic nor heuristic detection that covers all possible cases," it said.
"The Tcl documentation previously cited provides more comprehensive recommendations. However, the simple answer is that expressions in Tcl should always be braced," it added.
source scmagazineuk
Industry: Cyber Security

Latest Jobs
-
- Senior Presales Consultant | Managed Security Services | London
- London
- N/A
-
Senior Presales Consultant – Managed Security Services Location: London-commutable (Hybrid) A well-established cyber consultancy is seeking a Senior Presales Consultant to drive growth across its managed security services / advisory portfolio. This hybrid role bridges commercial and technical expertise supporting solution design, shaping customer proposals, and guiding conversations from scoping through to delivery. Key experience: Background in managed security services, including SOC operations and threat detection Strong knowledge of cloud and on-prem security tooling (SIEM, EDR, IAM) Penetration testing Proven ability to translate technical concepts into clear business value Confident in customer-facing engagements and pre-sales delivery Experience contributing to bids, proposals, and RFI/RFP responses To find out more contact me on 07884666351 Visa sponsorship is unfortunately not available for this role.
-
- New Business | Cyber Security | Overlay sales (UK Based- London commutable)
- London
- N/A
-
New Business Sales Hunter needed | Cybersecurity (UK Based- London commutable) Are you looking for uncapped commission, a fun and sociable team that drives success with no politics? If so...You must Have a demonstrable history of sales success in Cyber Security Follow Weatons law. The role: Seeking a proven New Business Sales Hunter to join an established, successful and expanding team. New business focused - £500-750 GP Sell a blend of security services & professional services. Ideal experience selling some or all of the following Cyber strategy & risk management Managed detection & response (MDR) Penetration testing Compliance & audit support You: Strong cybersecurity/IT services sales track record. Confident selling into mid-market & enterprise. UK based - London commutable Hunter mindset, full sales cycle ownership. Don't just send an email to apply give me a call on 07884666351
-
- New Business Sales Hunter | Cyber Security (UK Based)
- London
- To attract the right person
-
New Business Sales Hunter needed | Cybersecurity (UK Based) Are you looking for uncapped commission, a fun and sociable team that drives success with no politics? If so...You must Be UK based - and able to achieve UK SC clearance. (sorry no visas) Have a demonstrable history of sales success in Cyber Security Follow Weatons law. The role: Seeking a proven New Business Sales Hunter to join an established, successful and expanding cyber security firm. New business focused - £1m GP year one target (ramped). Sell a blend of security services & professional services. Ideal experience selling some or all of the following Cyber strategy & risk management Managed detection & response (MDR) Penetration testing Compliance & audit support You: Strong cybersecurity/IT services sales track record. Confident selling into mid-market & enterprise. UK based - London commutable 1x per week. Hunter mindset, full sales cycle ownership. Don't just send an email to apply give me a call on 07884666351