<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BIG-IP Scripted Monitors — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/big-ip-scripted-monitors/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:20:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/big-ip-scripted-monitors/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-32673 - F5 BIG-IP Scripted Monitor Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-32673/</link><pubDate>Wed, 13 May 2026 16:20:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-32673/</guid><description>CVE-2026-32673 allows an authenticated attacker with Resource Administrator or Administrator roles to execute arbitrary system commands with higher privileges in F5 BIG-IP scripted monitors, potentially crossing a security boundary in appliance mode deployments.</description><content:encoded><![CDATA[<p>CVE-2026-32673 is a vulnerability affecting F5 BIG-IP scripted monitors. An authenticated attacker possessing either the Resource Administrator or Administrator role can exploit this flaw to execute arbitrary system commands with elevated privileges. The successful exploitation of this vulnerability in appliance mode deployments allows the attacker to bypass security boundaries, gaining unauthorized access to sensitive system resources. Note that F5 does not evaluate software versions that have reached End of Technical Support (EoTS) for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the BIG-IP system with Resource Administrator or Administrator privileges.</li>
<li>The attacker accesses the BIG-IP configuration interface.</li>
<li>The attacker creates or modifies a scripted monitor.</li>
<li>Within the scripted monitor, the attacker injects malicious system commands.</li>
<li>The BIG-IP system executes the scripted monitor.</li>
<li>The injected commands are executed with elevated privileges.</li>
<li>In appliance mode deployments, the attacker may cross a security boundary due to the elevated privileges.</li>
<li>The attacker gains unauthorized access to sensitive system resources and can perform administrative actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32673 allows an attacker to execute arbitrary system commands with higher privileges on the affected BIG-IP system. In appliance mode deployments, this can lead to a breach of security boundaries, potentially granting the attacker complete control over the system. The number of victims and specific sectors targeted are currently unknown. However, given the widespread use of BIG-IP in critical infrastructure and enterprise networks, the potential impact is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the updates or mitigations provided by F5 Networks as detailed in their advisory [https://my.f5.com/manage/s/article/K000161040].</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-32673 Exploitation - Scripted Monitor Command Injection&rdquo; to detect potential exploitation attempts in your environment.</li>
<li>Review and restrict access to the Resource Administrator and Administrator roles on BIG-IP systems to minimize the attack surface.</li>
<li>Monitor BIG-IP systems for suspicious activity, including unusual command execution within scripted monitors.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32673</category><category>privilege-escalation</category><category>command-injection</category><category>big-ip</category></item></channel></rss>