<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BIG-IQ — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/big-iq/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:25:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/big-iq/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-42406 - F5 BIG-IP and BIG-IQ Authenticated Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-42406-f5-rce/</link><pubDate>Wed, 13 May 2026 16:25:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-42406-f5-rce/</guid><description>CVE-2026-42406 allows a highly privileged, authenticated attacker with the Certificate Manager role to modify configuration objects in F5 BIG-IP and BIG-IQ systems, leading to arbitrary command execution.</description><content:encoded><![CDATA[<p>CVE-2026-42406 is a vulnerability affecting F5 BIG-IP and BIG-IQ systems. A threat actor with high privileges and valid authentication credentials, specifically requiring at least the Certificate Manager role, can exploit this flaw. By modifying configuration objects within the system, the attacker can inject and execute arbitrary commands. This vulnerability poses a significant risk to organizations using these F5 products, as successful exploitation can lead to complete system compromise and unauthorized access to sensitive data. Software versions which have reached End of Technical Support (EoTS) are not evaluated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the BIG-IP or BIG-IQ system through valid credentials with at least Certificate Manager privileges.</li>
<li>The attacker authenticates to the administrative interface of the BIG-IP or BIG-IQ system.</li>
<li>The attacker identifies modifiable configuration objects within the system.</li>
<li>The attacker modifies a configuration object to inject malicious commands.</li>
<li>The system processes the modified configuration object.</li>
<li>The injected commands are executed within the system context.</li>
<li>The attacker achieves arbitrary command execution on the system.</li>
<li>The attacker leverages the executed commands to escalate privileges, move laterally within the network, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42406 can lead to complete compromise of the BIG-IP or BIG-IQ system. This can result in unauthorized access to sensitive data, disruption of services, and the potential for further lateral movement within the network. Given the critical role that BIG-IP and BIG-IQ systems play in network infrastructure, a successful attack can have significant consequences for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the mitigations recommended in F5&rsquo;s security advisory [https://my.f5.com/manage/s/article/K000160971].</li>
<li>Monitor authentication logs for suspicious login activity to the BIG-IP or BIG-IQ administrative interface.</li>
<li>Deploy the Sigma rule detecting configuration changes by highly privileged accounts to your SIEM and tune for your environment.</li>
<li>Review user roles and permissions to ensure the principle of least privilege is enforced.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>cve-2026-42406</category><category>f5</category><category>big-ip</category><category>big-iq</category><category>rce</category><category>authenticated</category><category>privilege escalation</category></item><item><title>CVE-2026-41957: F5 BIG-IP and BIG-IQ Authenticated Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-41957-rce/</link><pubDate>Wed, 13 May 2026 16:25:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-41957-rce/</guid><description>An authenticated remote code execution vulnerability (CVE-2026-41957) exists in the F5 BIG-IP and BIG-IQ Configuration utility, potentially leading to arbitrary code execution on affected systems.</description><content:encoded><![CDATA[<p>CVE-2026-41957 describes an authenticated remote code execution (RCE) vulnerability affecting the F5 BIG-IP and BIG-IQ Configuration utility. The specific attack vectors remain undisclosed. An attacker with valid credentials could exploit this vulnerability to execute arbitrary code on the target system. Given the critical role of BIG-IP and BIG-IQ in network infrastructure, successful exploitation can lead to significant disruption, data breaches, and further lateral movement within the network. Software versions which have reached End of Technical Support (EoTS) are not evaluated for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains valid credentials to access the BIG-IP or BIG-IQ Configuration utility.</li>
<li>Attacker authenticates to the Configuration utility using the acquired credentials.</li>
<li>Attacker crafts a malicious request targeting the undisclosed vulnerable component within the Configuration utility.</li>
<li>The malicious request triggers deserialization of untrusted data (CWE-502).</li>
<li>The deserialization process leads to the execution of arbitrary code on the system.</li>
<li>Attacker establishes a reverse shell or other remote access mechanism.</li>
<li>Attacker performs post-exploitation activities, such as gathering sensitive information or moving laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41957 can allow an authenticated attacker to execute arbitrary code on the affected BIG-IP or BIG-IQ system. This can lead to complete system compromise, allowing attackers to steal sensitive data, disrupt network services, and potentially pivot to other systems within the network. Given the central role of F5 products in many organizations&rsquo; network infrastructure, the impact of this vulnerability could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security updates released by F5 Networks to patch CVE-2026-41957 as soon as possible. Refer to F5&rsquo;s advisory <a href="https://my.f5.com/manage/s/article/K000156761">https://my.f5.com/manage/s/article/K000156761</a> for specific details and affected versions.</li>
<li>Deploy the Sigma rule &ldquo;Detects CVE-2026-41957 Exploitation Attempt — Suspicious URI Access&rdquo; to monitor web server logs for potential exploitation attempts.</li>
<li>Implement strong password policies and multi-factor authentication to reduce the risk of credential compromise, mitigating the initial access vector required to exploit CVE-2026-41957.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-41957</category><category>rce</category><category>f5</category><category>big-ip</category><category>big-iq</category><category>authenticated</category><category>deserialization</category></item><item><title>F5 BIG-IP and BIG-IQ iControl REST/TMOS Shell Privilege Escalation Vulnerability (CVE-2026-40698)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40698-f5-privesc/</link><pubDate>Wed, 13 May 2026 16:23:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40698-f5-privesc/</guid><description>CVE-2026-40698 allows a highly privileged, authenticated attacker with Resource Administrator privileges in F5 BIG-IP and BIG-IQ systems to create SNMP configuration objects via iControl REST or TMOS shell (tmsh), resulting in privilege escalation.</description><content:encoded><![CDATA[<p>CVE-2026-40698 is a privilege escalation vulnerability affecting F5 BIG-IP and BIG-IQ systems. A remote, authenticated attacker who possesses at least Resource Administrator privileges can exploit this vulnerability to gain higher-level privileges within the system. The vulnerability stems from the ability to create arbitrary SNMP configuration objects through either the iControl REST API or the TMOS shell (tmsh). This can lead to the attacker gaining unauthorized control over the affected system. Note that software versions which have reached End of Technical Support (EoTS) are not evaluated as part of this vulnerability disclosure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the BIG-IP or BIG-IQ system with Resource Administrator privileges.</li>
<li>Attacker crafts a malicious SNMP configuration object using iControl REST API.</li>
<li>Attacker sends the malicious configuration object to the iControl REST endpoint.</li>
<li>Alternatively, attacker crafts a malicious SNMP configuration object using the TMOS shell (tmsh).</li>
<li>Attacker executes the crafted SNMP configuration object via the TMOS shell.</li>
<li>The system processes the malicious SNMP configuration object.</li>
<li>The malicious SNMP configuration object is created.</li>
<li>Attacker leverages the newly created SNMP configuration object to escalate privileges to gain unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40698 allows an attacker with Resource Administrator privileges to escalate their privileges within the BIG-IP or BIG-IQ system. This can lead to complete system compromise, allowing the attacker to modify configurations, access sensitive data, and potentially disrupt services. The specific impact depends on the scope of the escalated privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch or upgrade to a fixed version of BIG-IP or BIG-IQ as recommended by F5 Networks to remediate CVE-2026-40698 (<a href="https://my.f5.com/manage/s/article/K000160981)">https://my.f5.com/manage/s/article/K000160981)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SNMP Configuration via iControl REST&rdquo; to detect potentially malicious SNMP configuration creation via iControl REST API.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SNMP Configuration via TMOS Shell&rdquo; to detect potentially malicious SNMP configuration creation via TMOS shell.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>privilege-escalation</category><category>snmp</category></item><item><title>CVE-2026-32643: F5 BIG-IP and BIG-IQ Authenticated Command Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-32643/</link><pubDate>Wed, 13 May 2026 16:20:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-32643/</guid><description>CVE-2026-32643 describes a vulnerability in F5 BIG-IP and BIG-IQ systems that allows a highly privileged, authenticated attacker with the Certificate Manager role to modify configuration objects, leading to arbitrary command execution.</description><content:encoded><![CDATA[<p>CVE-2026-32643 is a vulnerability affecting F5 BIG-IP and BIG-IQ systems. A highly privileged, authenticated attacker possessing at least the Certificate Manager role can exploit this vulnerability. Successful exploitation allows the attacker to modify configuration objects, which in turn enables the execution of arbitrary commands on the affected system. This vulnerability poses a significant risk, potentially leading to complete system compromise if exploited. Software versions that have reached End of Technical Support (EoTS) are not evaluated for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access and obtains valid credentials with at least Certificate Manager role privileges on the BIG-IP or BIG-IQ system.</li>
<li>Attacker authenticates to the BIG-IP or BIG-IQ management interface (GUI or API).</li>
<li>Attacker identifies configuration objects that can be modified to inject arbitrary commands. This may involve examining existing configuration settings or leveraging known vulnerable parameters.</li>
<li>Attacker modifies the identified configuration object to include malicious commands. This could involve injecting shell commands or scripts into fields that are later executed by the system.</li>
<li>Attacker triggers the execution of the modified configuration object. This may involve restarting services, applying configuration changes, or invoking specific functions within the BIG-IP or BIG-IQ system.</li>
<li>The injected commands are executed with the privileges of the BIG-IP or BIG-IQ system, allowing the attacker to perform actions such as installing malware, creating new user accounts, or exfiltrating sensitive data.</li>
<li>Attacker leverages the command execution to further compromise the system or network, potentially gaining access to sensitive data or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32643 allows an attacker to execute arbitrary commands on the affected BIG-IP or BIG-IQ system. This can lead to a complete compromise of the system, including the ability to install malware, steal sensitive data, or disrupt critical services. Given the central role of BIG-IP and BIG-IQ systems in network infrastructure, a successful attack could have widespread consequences, impacting numerous organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch or upgrade to a non-vulnerable version of BIG-IP or BIG-IQ as recommended by F5. Refer to F5&rsquo;s advisory <a href="https://my.f5.com/manage/s/article/K000160972">https://my.f5.com/manage/s/article/K000160972</a> for specific instructions.</li>
<li>Restrict access to the BIG-IP and BIG-IQ management interface to only authorized personnel and enforce strong authentication measures.</li>
<li>Review existing user roles and permissions to ensure that only necessary privileges are granted. Limit the number of users with the Certificate Manager role.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>command execution</category><category>privilege escalation</category><category>f5</category></item></channel></rss>