CVE-2022-1388

F5 BIG-IP — iControl REST API Authentication Bypass Enables Unauthenticated Remote Code Execution as Root
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

Actively Exploited. This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog on May 10, 2022 with a remediation deadline of May 31, 2022. Federal agencies are required to apply mitigations per BOD 22-01.

CVE-2022-1388 is a critical authentication bypass vulnerability in F5 BIG-IP's iControl REST API. By sending HTTP requests with specific manipulated headers, an unauthenticated attacker can bypass authentication and execute arbitrary OS commands as root on the BIG-IP appliance. Because BIG-IP is a network security appliance providing load balancing, SSL inspection, and application delivery, its compromise gives attackers a privileged position to intercept traffic, modify application responses, and pivot into protected network segments.

Exploitation began within 48 hours of F5's advisory, with PoCs published by multiple research teams on May 8, 2022. The vulnerability is straightforward to exploit — a single crafted HTTP request — and mass exploitation was observed within days.

What Is F5 BIG-IP?

F5 BIG-IP is a family of network appliances providing application delivery, load balancing, SSL/TLS offloading, web application firewall (WAF), and DDoS protection. BIG-IP appliances sit in front of application servers, making them highly privileged network infrastructure with visibility into all traffic they process. The iControl REST API is BIG-IP's management API, used for configuration, automation, and integration. It is accessible on the same management IP as the TMUI (Traffic Management User Interface) web portal.

Affected Versions

BIG-IP Version Vulnerable Fixed Version
16.1.x 16.1.0 – 16.1.2 16.1.2.2
15.1.x 15.1.0 – 15.1.5 15.1.5.1
14.1.x 14.1.0 – 14.1.4 14.1.4.6
13.1.x 13.1.0 – 13.1.4 13.1.4.1
12.1.x 12.1.0 – 12.1.6 End-of-life — no patch
11.6.x 11.6.0 – 11.6.5 End-of-life — no patch

BIG-IP 17.x was not affected. BIG-IP versions 11.x and 12.x are end-of-life and received no patches.

Technical Details

Root Cause: Authentication Bypass via HTTP Header Manipulation

The iControl REST API authentication is implemented as a middleware layer that validates credentials before forwarding requests to the underlying REST endpoints. The bypass exploits how BIG-IP processes certain HTTP headers when the request is received:

The attack involves sending a request with:

  • The X-F5-Auth-Token header set to an empty or malformed value
  • The Connection: Keep-Alive, X-F5-Auth-Token header (adding the auth token header to the Connection hop-by-hop headers list)
  • A Host header pointing to the local localhost address

When BIG-IP processes these headers, the Connection header causes X-F5-Auth-Token to be treated as a hop-by-hop header and stripped before the authentication middleware evaluates it. The request then reaches the REST API backend without a valid token but with the appearance of an authenticated internal request (due to the localhost routing).

A typical exploit request:

POST /mgmt/tm/util/bash HTTP/1.1
Host: localhost
Connection: keep-alive, X-F5-Auth-Token
X-F5-Auth-Token: anything
X-Forwarded-For: 127.0.0.1
Content-Type: application/json

{"command":"run","utilCmdArgs":"-c 'id'"}

The /mgmt/tm/util/bash endpoint, once reached without authentication checks, executes the supplied bash command as root.

Attack Characteristics

Attribute Detail
Attack Vector Network — iControl REST API (HTTPS port 443 or 8443 on management IP)
Authentication Required None — single crafted HTTP request
Code Execution Root on the BIG-IP appliance OS
Management Interface Exposed Must be accessible from attacker network — internet exposure is a misconfiguration
Impact on Traffic Attacker with root on BIG-IP can modify traffic, exfiltrate SSL keys, alter load balancer rules

Discovery

CVE-2022-1388 was discovered by F5 internal security teams and by independent security researchers. F5 released patches on May 4, 2022, and published the advisory on May 5. Within three days, Horizon3.ai and other security firms published working PoC exploits. The simplicity of the exploit — a single HTTP request with specific headers — meant that weaponization was trivial once the advisory provided sufficient detail for reverse engineering.

Exploitation Context

  • Mass exploitation within 48–72 hours of advisory publication
  • Threat actors: Nation-state groups (Iranian APT groups were among the first confirmed exploiters), criminal threat actors, and ransomware operators
  • Common payloads: Webshell deployment to the BIG-IP management interface, SSH key injection (/root/.ssh/authorized_keys), credential harvesting from BIG-IP configuration files (which contain SSL private keys, backend server credentials, and LDAP/AD integration credentials)
  • Traffic interception capability: An attacker with root on BIG-IP can insert themselves into all traffic the appliance processes — including decrypting SSL traffic it terminates
  • Ransomware use: Multiple ransomware operators used CVE-2022-1388 for initial access in enterprises where BIG-IP was the internet edge
  • Exposure: Approximately 16,000 BIG-IP management interfaces were estimated to be internet-accessible (a misconfiguration — F5 explicitly recommends against this)

Remediation

CISA BOD 22-01 Deadline: May 31, 2022. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Recommended Actions

  1. Apply the F5 patch immediately. Fixed versions are listed in the table above. BIG-IP 11.x and 12.x are end-of-life — upgrade to a supported version.

  2. Restrict access to the iControl REST API and TMUI. The management interface (iControl REST, TMUI web portal) should never be internet-accessible. Restrict to a dedicated management network accessible only from authorized management workstations:

    # Block external access to management ports
    modify /sys httpd allow add { 10.0.0.0/8 }
    
  3. Rotate all credentials stored on or processed by BIG-IP — SSL private keys, service account credentials in BIG-IP configuration, LDAP/AD integration credentials, and any secrets stored in iRules or data groups.

  4. Check for post-exploitation persistence:

    • Look for unexpected SSH keys in /root/.ssh/authorized_keys
    • Check for unexpected files in /var/www/, /etc/httpd/, or BIG-IP virtual server directories
    • Review bash history for root: cat /root/.bash_history
    • Check for unexpected cron jobs: crontab -l; ls /etc/cron*
  5. Rotate SSL private keys — BIG-IP terminates SSL for applications it proxies; if the appliance was compromised, all private keys it holds should be considered exposed and re-issued.

Key Details

PropertyValue
CVE ID CVE-2022-1388
Vendor / Product F5 — BIG-IP
NVD Published2022-05-05
NVD Last Modified2025-10-27
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-306 — Missing Authentication for Critical Function
CISA KEV Added2022-05-10
CISA KEV Deadline2022-05-31
Known Ransomware Use ⚠️ Yes

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2022-05-31. Apply updates per vendor instructions.

Timeline

DateEvent
2022-05-04F5 releases patches for CVE-2022-1388 across all affected BIG-IP versions
2022-05-05CVE-2022-1388 published; F5 security advisory K23605346 released
2022-05-08Multiple public PoC exploits released; active exploitation confirmed within 48 hours of advisory
2022-05-10CISA adds CVE-2022-1388 to KEV catalog
2022-05-31CISA BOD 22-01 remediation deadline