First published: Thu Oct 26 2023(Updated: )
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Credit: f5sirt@f5.com f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | >=17.1.0<=17.1.1 | 17.1.1.1 |
F5 BIG-IP | >=16.1.0<=16.1.4 | 16.1.4.2 |
F5 BIG-IP | >=15.1.0<=15.1.10 | 15.1.10.3 |
F5 BIG-IP | >=14.1.0<=14.1.5 | 14.1.5.6 |
F5 BIG-IP | >=13.1.0<=13.1.5 | 13.1.5.1 |
F5 BIG-IP Configuration Utility | ||
F5 BIG-IP Access Policy Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Access Policy Manager | >=14.1.0<=14.1.5 | |
F5 BIG-IP Access Policy Manager | >=15.1.0<=15.1.10 | |
F5 BIG-IP Access Policy Manager | >=16.1.0<=16.1.4 | |
F5 BIG-IP Access Policy Manager | >=17.1.0<=17.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=14.1.0<=14.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=15.1.0<=15.1.10 | |
F5 BIG-IP Advanced Firewall Manager | >=16.1.0<=16.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=17.1.0<=17.1.1 | |
F5 Big-ip Advanced Web Application Firewall | >=13.1.0<=13.1.5 | |
F5 Big-ip Advanced Web Application Firewall | >=14.1.0<=14.1.5 | |
F5 Big-ip Advanced Web Application Firewall | >=15.1.0<=15.1.10 | |
F5 Big-ip Advanced Web Application Firewall | >=16.1.0<=16.1.4 | |
F5 Big-ip Advanced Web Application Firewall | >=17.1.0<=17.1.1 | |
F5 Big-ip Carrier-grade Nat | >=13.1.0<=13.1.5 | |
F5 Big-ip Carrier-grade Nat | >=14.1.0<=14.1.5 | |
F5 Big-ip Carrier-grade Nat | >=15.1.0<=15.1.10 | |
F5 Big-ip Carrier-grade Nat | >=16.1.0<=16.1.4 | |
F5 Big-ip Carrier-grade Nat | >=17.1.0<=17.1.1 | |
F5 Big-ip Ddos Hybrid Defender | >=13.1.0<=13.1.5 | |
F5 Big-ip Ddos Hybrid Defender | >=14.1.0<=14.1.5 | |
F5 Big-ip Ddos Hybrid Defender | >=15.1.0<=15.1.10 | |
F5 Big-ip Ddos Hybrid Defender | >=16.1.0<=16.1.4 | |
F5 Big-ip Ddos Hybrid Defender | >=17.1.0<=17.1.1 | |
F5 Big-ip Ssl Orchestrator | >=13.1.0<=13.1.5 | |
F5 Big-ip Ssl Orchestrator | >=14.1.0<=14.1.5 | |
F5 Big-ip Ssl Orchestrator | >=15.1.0<=15.1.10 | |
F5 Big-ip Ssl Orchestrator | >=16.1.0<=16.1.4 | |
F5 Big-ip Ssl Orchestrator | >=17.1.0<=17.1.1 | |
F5 Big-ip Domain Name System | >=13.1.0<=13.1.5 | |
F5 Big-ip Domain Name System | >=14.1.0<=14.1.5 | |
F5 Big-ip Domain Name System | >=15.1.0<=15.1.10 | |
F5 Big-ip Domain Name System | >=16.1.0<=16.1.4 | |
F5 Big-ip Domain Name System | >=17.1.0<=17.1.1 | |
F5 Big-ip Local Traffic Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Local Traffic Manager | >=14.1.0<=14.1.5 | |
F5 Big-ip Local Traffic Manager | >=15.1.0<=15.1.10 | |
F5 Big-ip Local Traffic Manager | >=16.1.0<=16.1.4 | |
F5 Big-ip Local Traffic Manager | >=17.1.0<=17.1.1 | |
F5 Big-ip Policy Enforcement Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Policy Enforcement Manager | >=14.1.0<=14.1.5 | |
F5 Big-ip Policy Enforcement Manager | >=15.1.0<=15.1.10 | |
F5 Big-ip Policy Enforcement Manager | >=16.1.0<=16.1.4 | |
F5 Big-ip Policy Enforcement Manager | >=17.1.0<=17.1.1 | |
F5 Big-ip Automation Toolchain | >=13.1.0<=13.1.5 | |
F5 Big-ip Automation Toolchain | >=14.1.0<=14.1.5 | |
F5 Big-ip Automation Toolchain | >=15.1.0<=15.1.10 | |
F5 Big-ip Automation Toolchain | >=16.1.0<=16.1.4 | |
F5 Big-ip Automation Toolchain | >=17.1.0<=17.1.1 | |
F5 Big-ip Container Ingress Services | >=13.1.0<=13.1.5 | |
F5 Big-ip Container Ingress Services | >=14.1.0<=14.1.5 | |
F5 Big-ip Container Ingress Services | >=15.1.0<=15.1.10 | |
F5 Big-ip Container Ingress Services | >=16.1.0<=16.1.4 | |
F5 Big-ip Container Ingress Services | >=17.1.0<=17.1.1 | |
F5 BIG-IP Application Security Manager | >=13.1.0<=13.1.5 | |
F5 BIG-IP Application Security Manager | >=14.1.0<=14.1.5 | |
F5 BIG-IP Application Security Manager | >=15.1.0<=15.1.10 | |
F5 BIG-IP Application Security Manager | >=16.1.0<=16.1.4 | |
F5 BIG-IP Application Security Manager | >=17.1.0<=17.1.1 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.5 | |
F5 BIG-IP Analytics | >=14.1.0<=14.1.5 | |
F5 BIG-IP Analytics | >=15.1.0<=15.1.10 | |
F5 BIG-IP Analytics | >=16.1.0<=16.1.4 | |
F5 BIG-IP Analytics | >=17.1.0<=17.1.1 | |
F5 Big-ip Application Acceleration Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Application Acceleration Manager | >=14.1.0<=14.1.5 | |
F5 Big-ip Application Acceleration Manager | >=15.1.0<=15.1.10 | |
F5 Big-ip Application Acceleration Manager | >=16.1.0<=16.1.4 | |
F5 Big-ip Application Acceleration Manager | >=17.1.0<=17.1.1 | |
F5 Big-ip Application Visibility And Reporting | >=13.1.0<=13.1.5 | |
F5 Big-ip Application Visibility And Reporting | >=14.1.0<=14.1.5 | |
F5 Big-ip Application Visibility And Reporting | >=15.1.0<=15.1.10 | |
F5 Big-ip Application Visibility And Reporting | >=16.1.0<=16.1.4 | |
F5 Big-ip Application Visibility And Reporting | >=17.1.0<=17.1.1 | |
F5 Big-ip Fraud Protection Services | >=13.1.0<=13.1.5 | |
F5 Big-ip Fraud Protection Services | >=14.1.0<=14.1.5 | |
F5 Big-ip Fraud Protection Services | >=15.1.0<=15.1.10 | |
F5 Big-ip Fraud Protection Services | >=16.1.0<=16.1.4 | |
F5 Big-ip Fraud Protection Services | >=17.1.0<=17.1.1 | |
F5 Big-ip Global Traffic Manager | >=13.1.0<=13.1.5 | |
F5 Big-ip Global Traffic Manager | >=14.1.0<=14.1.5 | |
F5 Big-ip Global Traffic Manager | >=15.1.0<=15.1.10 | |
F5 Big-ip Global Traffic Manager | >=16.1.0<=16.1.4 | |
F5 Big-ip Global Traffic Manager | >=17.1.0<=17.1.1 | |
F5 Big-ip Link Controller | >=13.1.0<=13.1.5 | |
F5 Big-ip Link Controller | >=14.1.0<=14.1.5 | |
F5 Big-ip Link Controller | >=15.1.0<=15.1.10 | |
F5 Big-ip Link Controller | >=16.1.0<=16.1.4 | |
F5 Big-ip Link Controller | >=17.1.0<=17.1.1 | |
F5 Big-ip Webaccelerator | >=13.1.0<=13.1.5 | |
F5 Big-ip Webaccelerator | >=14.1.0<=14.1.5 | |
F5 Big-ip Webaccelerator | >=15.1.0<=15.1.10 | |
F5 Big-ip Webaccelerator | >=16.1.0<=16.1.4 | |
F5 Big-ip Webaccelerator | >=17.1.0<=17.1.1 | |
F5 Big-ip Websafe | >=13.1.0<=13.1.5 | |
F5 Big-ip Websafe | >=14.1.0<=14.1.5 | |
F5 Big-ip Websafe | >=15.1.0<=15.1.10 | |
F5 Big-ip Websafe | >=16.1.0<=16.1.4 | |
F5 Big-ip Websafe | >=17.1.0<=17.1.1 | |
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 | ||
>=13.1.0<=13.1.5 | ||
>=14.1.0<=14.1.5 | ||
>=15.1.0<=15.1.10 | ||
>=16.1.0<=16.1.4 | ||
>=17.1.0<=17.1.1 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-46747 is a vulnerability in the BIG-IP Configuration utility that allows unauthenticated remote code execution.
CVE-2023-46747 has a severity rating of 9.8 (Critical).
The F5 BIG-IP Configuration utility is affected by CVE-2023-46747.
No, CVE-2023-46747 allows an attacker to bypass authentication and execute code without authentication.
To fix CVE-2023-46747, update the BIG-IP Configuration utility to the latest version provided by F5.