F5 iControl REST RCE Vulnerability (CVE-2026-41225)
CVE-2026-41225 allows a highly privileged, authenticated attacker with at least the Manager role to create configuration objects in F5 iControl REST, leading to arbitrary command execution.
CVE-2026-41225 is a critical vulnerability affecting F5 iControl REST. It enables a highly privileged attacker, authenticated with at least the Manager role, to create malicious configuration objects. This flaw stems from an incorrect use of privileged APIs, potentially allowing the injection of arbitrary commands. Successful exploitation leads to Remote Code Execution (RCE) on the affected system, compromising its integrity and availability. Note that End of Technical Support (EoTS) software versions are not evaluated for this vulnerability.
Attack Chain
- The attacker authenticates to the iControl REST interface with Manager-level or higher privileges.
- The attacker crafts a malicious configuration object containing commands for execution.
- The attacker leverages the iControl REST API to create or modify the malicious configuration object.
- The vulnerable API endpoint processes the configuration object without proper sanitization.
- The system executes the attacker-supplied commands within the context of the iControl REST process.
- The attacker gains arbitrary code execution on the underlying system.
- The attacker can then perform lateral movement, privilege escalation, or data exfiltration.
- The ultimate impact is full system compromise, including the ability to disrupt services, steal sensitive information, or install persistent backdoors.
Impact
Successful exploitation of CVE-2026-41225 allows a privileged attacker to achieve arbitrary command execution. This can lead to a full system compromise, potentially affecting critical network infrastructure and services. The high CVSS score (9.1) reflects the significant risk posed by this vulnerability. Organizations using affected versions of F5 iControl REST are at risk of data breaches, service disruption, and other severe security incidents.
Recommendation
- Apply the security updates provided by F5 Networks to remediate CVE-2026-41225.
- Review and enforce the principle of least privilege for iControl REST access to limit the impact of potential compromises.
- Implement network segmentation to restrict lateral movement following a successful exploit.
- Deploy the Sigma rule “Detect iControl REST Configuration Object Manipulation” to identify suspicious activity related to configuration object creation or modification via the iControl REST API.
- Enable detailed logging for iControl REST API calls to aid in incident investigation and detection efforts.
Detection coverage 2
Detect iControl REST Configuration Object Manipulation
highDetects CVE-2026-41225 exploitation — creation or modification of configuration objects via the iControl REST API, indicating potential command injection attempts.
Detect iControl REST API Authentication Attempts
lowDetects authentication attempts to the iControl REST API, which may precede or follow exploitation of CVE-2026-41225. Monitor for unusual login patterns.
Detection queries are available on the platform. Get full rules →