<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BIG-IQ System — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/big-iq-system/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:20:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/big-iq-system/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-20916: F5 BIG-IQ iControl REST Arbitrary File Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-20916/</link><pubDate>Wed, 13 May 2026 16:20:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-20916/</guid><description>CVE-2026-20916 describes a vulnerability in F5 BIG-IQ where an authenticated user with low privileges can create or modify arbitrary files via an undisclosed iControl REST endpoint, potentially leading to privilege escalation or system compromise.</description><content:encoded><![CDATA[<p>CVE-2026-20916 is a vulnerability affecting F5 BIG-IQ systems. It allows an authenticated user with low privileges to create or modify arbitrary files on the system. The vulnerability exists due to an undisclosed iControl REST endpoint that lacks proper authorization checks. Successful exploitation could allow an attacker to overwrite critical system files, execute arbitrary code, or escalate privileges. It&rsquo;s important to note that F5 does not evaluate software versions that have reached End of Technical Support (EoTS) for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the BIG-IQ system as a low-privileged user.</li>
<li>The attacker identifies an undisclosed iControl REST endpoint vulnerable to arbitrary file modification.</li>
<li>The attacker crafts a malicious request to the identified endpoint.</li>
<li>The crafted request includes a file path and content to be written or modified. This path may leverage path traversal (CWE-22) to reach protected directories.</li>
<li>The BIG-IQ system processes the request without proper authorization checks, allowing the attacker to write or modify the specified file.</li>
<li>The attacker modifies a critical system file, such as a configuration file or startup script, to inject malicious code.</li>
<li>The injected code is executed when the system restarts or a related service is invoked.</li>
<li>The attacker achieves arbitrary code execution with elevated privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20916 can lead to significant consequences. An attacker could gain complete control of the affected BIG-IQ system, potentially disrupting network services and compromising sensitive data. Given the role of BIG-IQ in managing F5 devices, a successful attack could also lead to the compromise of other systems within the network. The impact is heightened by the relative ease of exploitation, requiring only low-privileged access and a crafted API request.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the updates or mitigations provided by F5 Networks in their security advisory [https://my.f5.com/manage/s/article/K000158029].</li>
<li>Monitor iControl REST endpoint access logs for suspicious activity, particularly POST requests with unusual file paths.</li>
<li>Implement the Sigma rule provided below to detect attempts to write to sensitive file paths.</li>
<li>Review and enforce the principle of least privilege for all iControl REST users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>arbitrary file modification</category><category>privilege escalation</category><category>web application</category></item></channel></rss>