CVE-2023-46747

Published Oct 26, 2023

Last updated 8 hours ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2023-46747 is a critical authentication bypass vulnerability found in the Traffic Management User Interface (TMUI) of F5 BIG-IP. The vulnerability stems from improper handling of HTTP requests in the TMUI's Apache JServ Protocol (AJP) connector. By crafting malicious AJP requests, attackers can manipulate the `remote_user` and `REMOTEROLE` headers, effectively bypassing authentication controls and gaining administrative privileges. This allows an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.

Description
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Source
f5sirt@f5.com
NVD status
Analyzed
Products
big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_advanced_web_application_firewall, big-ip_carrier-grade_nat, big-ip_ddos_hybrid_defender, big-ip_ssl_orchestrator, big-ip_domain_name_system, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_automation_toolchain, big-ip_container_ingress_services, big-ip_application_security_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_visibility_and_reporting, big-ip_fraud_protection_services, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_webaccelerator, big-ip_websafe

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability
Exploit added on
Oct 31, 2023
Exploit action due
Nov 21, 2023
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

f5sirt@f5.com
CWE-288
nvd@nist.gov
CWE-306

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

20

  1. Actor exploiting multiple F5 BIG-IP vulnerabilities from 208.123.119.118 🇺🇸 ( SHOCK-1 ) VirusTotal Detections 0/95 🟢 The actor exploited CVE-2022-1388, CVE-2023-46747 and attempted to afterwards access F5 Local Traffic Management (LTM) components 🚨 https://t.co/OFHC

    @DefusedCyber

    27 Oct 2025

    1636 Impressions

    4 Retweets

    11 Likes

    2 Bookmarks

    0 Replies

    1 Quote

  2. Actor exploiting multiple F5 BIG-IP vulnerabilities from 196.178.23.228 🇹🇳( TUNISIANA ) VirusTotal Detections 0/95 🟢 The actor ran version & hostname enumeration, and proceeded to exploit CVE-2022-1388 and CVE-2023-46747 on an F5 honeypot 🍯 https://t.co/I22nfcL

    @DefusedCyber

    26 Oct 2025

    8774 Impressions

    5 Retweets

    48 Likes

    23 Bookmarks

    3 Replies

    1 Quote

  3. Actor exploiting CVE-2023-46747 (F5 BIG-IP Auth Bypass Vuln ) from 104.140.226.176 🇺🇸 ( AS62904 ) VirusTotal Detections 0/95 🟢 Actor attempts to create a new admin user with full permissions https://t.co/bYgs5yFu8R

    @DefusedCyber

    21 Oct 2025

    1987 Impressions

    5 Retweets

    29 Likes

    4 Bookmarks

    1 Reply

    1 Quote

  4. Actor exploiting CVE-2023-46747 (F5 BIG-IP Auth Bypass Vuln ) from 195.248.71.38 🇷🇺 ( LLC Melt-internet ) VirusTotal Detections 0/95 🟢 Actor attempts to create a new admin user with full permissions https://t.co/bgjkfWc1RE

    @DefusedCyber

    21 Oct 2025

    7772 Impressions

    15 Retweets

    44 Likes

    21 Bookmarks

    4 Replies

    2 Quotes

  5. 【独自】F5 BIG-IPにおけるリモートコード実行脆弱性CVE-2023-46747と、FortiOS及びFortiProxyにおけるバッファオーバーフローCVE-2023-27997が、ランサムウェアにより悪用された。米国サイバーセキュリティ・社会基盤安全保障庁(CISA)の既知の悪用された脆弱性カタログが更新。 https://t.co/fyN6WPZRqY

    @__kokumoto

    24 Oct 2024

    1795 Impressions

    4 Retweets

    26 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

Configurations