Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-1388
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
F5 BIG-IP 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP 存在访问控制错误漏洞,攻击者可以通过未公开的请求利用该漏洞绕过BIG-IP中的iControl REST身份验证来控制受影响的系统。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
F5BIG-IP 17.0.0 ~ 17.0.x* -
II. Public POCs for CVE-2022-1388
#POC DescriptionSource LinkShenlong Link
1K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388https://github.com/numanturle/CVE-2022-1388POC Details
2Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)https://github.com/jheeree/CVE-2022-1388-checkerPOC Details
3This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.https://github.com/MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-ExposedPOC Details
4A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.https://github.com/Osyanina/westone-CVE-2022-1388-scannerPOC Details
5CVE-2022-1388 F5 BIG-IP RCE 批量检测https://github.com/doocop/CVE-2022-1388-EXPPOC Details
6Nonehttps://github.com/blind-intruder/CVE-2022-1388-RCE-checker-and-POC-ExploitPOC Details
7Nonehttps://github.com/Hudi233/CVE-2022-1388POC Details
8PoC for CVE-2022-1388_F5_BIG-IPhttps://github.com/sherlocksecurity/CVE-2022-1388-Exploit-POCPOC Details
9batch scan CVE-2022-1388https://github.com/yukar1z0e/CVE-2022-1388POC Details
10CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCEhttps://github.com/0xf4n9x/CVE-2022-1388POC Details
11F5 BIG-IP RCE exploitation (CVE-2022-1388)https://github.com/alt3kx/CVE-2022-1388_PoCPOC Details
12CVE-2022-1388 F5 Big IP unauth remote code executionhttps://github.com/Vulnmachines/F5-Big-IP-CVE-2022-1388POC Details
13Exploit and Check Script for CVE 2022-1388https://github.com/ZephrFish/F5-CVE-2022-1388-ExploitPOC Details
14POC for CVE-2022-1388https://github.com/horizon3ai/CVE-2022-1388POC Details
15CVE-2022-1388 F5 BIG-IP iControl REST RCEhttps://github.com/Al1ex/CVE-2022-1388POC Details
16F5 BIG-IP iControl REST身份验证绕过漏洞https://github.com/Henry4E36/CVE-2022-1388POC Details
17CVE-2022-1388 F5 BIG-IP iControl REST身份验证绕过漏洞https://github.com/savior-only/CVE-2022-1388POC Details
18CVE-2022-1388https://github.com/saucer-man/CVE-2022-1388POC Details
19CVE-2022-1388 POC exploithttps://github.com/superzerosec/CVE-2022-1388POC Details
20PoC For F5 BIG-IP - bash script Exploit one Linerhttps://github.com/Stonzyy/Exploit-F5-CVE-2022-1388POC Details
21CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.https://github.com/MrCl0wnLab/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-ParameterPOC Details
22Reverse Shell for CVE-2022-1388https://github.com/qusaialhaddad/F5-BigIP-CVE-2022-1388POC Details
23POC of CVE-2022-1388https://github.com/chesterblue/CVE-2022-1388POC Details
24Nonehttps://github.com/Angus-Team/F5-BIG-IP-RCE-CVE-2022-1388POC Details
25CVE-2022-1388-EXP可批量实现攻击https://github.com/LinJacck/CVE-2022-1388-EXPPOC Details
26Simple shell script for the exploithttps://github.com/iveresk/cve-2022-1388-1vereskPOC Details
27BIG-IP iControl REST vulnerability CVE-2022-1388 PoChttps://github.com/shamo0/CVE-2022-1388POC Details
28Nonehttps://github.com/vesperp/CVE-2022-1388-F5-BIG-IPPOC Details
29Test and Exploit Scripts for CVE 2022-1388 (F5 Big-IP)https://github.com/thatonesecguy/CVE-2022-1388-ExploitPOC Details
30A Test API for testing the POC against CVE-2022-1388https://github.com/bandit92/CVE2022-1388_TestAPIPOC Details
31CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitationhttps://github.com/aodsec/CVE-2022-1388-PocExpPOC Details
32Nonehttps://github.com/0xAgun/CVE-2022-1388POC Details
33Nonehttps://github.com/AmirHoseinTangsiriNET/CVE-2022-1388-ScannerPOC Details
34CVE-2022-1388 Scannerhttps://github.com/EvilLizard666/CVE-2022-1388POC Details
35CVE-2022-1388https://github.com/mr-vill4in/CVE-2022-1388POC Details
36This repository consists of the python exploit for CVE-2022-1388 (F5's BIG-IP Authentication Bypass to RCE) https://github.com/omnigodz/CVE-2022-1388POC Details
37Nonehttps://github.com/pauloink/CVE-2022-1388POC Details
38Nuclei Template for CVE-2022-1388https://github.com/SecTheBit/CVE-2022-1388POC Details
39F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LABhttps://github.com/Zeyad-Azima/CVE-2022-1388POC Details
40Tool for CVE-2022-1388 https://github.com/justakazh/CVE-2022-1388POC Details
41An Improved Proof of Concept for CVE-2022-1388 w/ an Interactive Shellhttps://github.com/PsychoSec2/CVE-2022-1388-POCPOC Details
42Improved POC for CVE-2022-1388 that affects multiple F5 products.https://github.com/iveresk/cve-2022-1388-iveresk-command-shellPOC Details
43Nonehttps://github.com/Wrin9/CVE-2022-1388POC Details
44CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rusthttps://github.com/aancw/CVE-2022-1388-rsPOC Details
45CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合https://github.com/west9b/F5-BIG-IP-POCPOC Details
46CVE-2022-1388https://github.com/sashka3076/F5-BIG-IP-exploitPOC Details
47CVE-2022-1388 | F5 - Big IP Pre Auth RCE via '/mgmt/tm/util/bash' endpointhttps://github.com/li8u99/CVE-2022-1388POC Details
48Mass-Exploit-CVE-2022-1388https://github.com/electr0lulz/Mass-CVE-2022-1388POC Details
49PoC for exploiting CVE-2022-1388 on BIG IP F5https://github.com/Luchoane/CVE-2022-1388_refreshPOC Details
50CVE-2022-1388, bypassing iControl REST authenticationhttps://github.com/jbharucha05/CVE-2022-1388POC Details
51cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCEhttps://github.com/On-Cyber-War/CVE-2022-1388POC Details
52cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCEhttps://github.com/OnCyberWar/CVE-2022-1388POC Details
53Nonehttps://github.com/revanmalang/CVE-2022-1388POC Details
54Nonehttps://github.com/amitlttwo/CVE-2022-1388POC Details
55Scan IP ranges for IP's vulnerable to the F5 Big IP exploit (CVE-2022-1388)https://github.com/M4fiaB0y/CVE-2022-1388POC Details
56Nonehttps://github.com/devengpk/CVE-2022-1388POC Details
57-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teamshttps://github.com/vaelwolf/CVE-2022-1388POC Details
58F5 BIG-IP Exploit Using CVE-2022-1388 and CVE-2022-41800https://github.com/j-baines/tippa-my-tonguePOC Details
59F5-BIG-IP Remote Code Execution Vulnerability CVE-2022-1388: A Case Studyhttps://github.com/SudeepaShiranthaka/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-StudyPOC Details
60CVE-2022-1388 - F5 Router RCE Replicahttps://github.com/battleofthebots/refreshPOC Details
61CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitationhttps://github.com/0x7eTeam/CVE-2022-1388-PocExpPOC Details
62exploit pochttps://github.com/nvk0x/CVE-2022-1388-exploitPOC Details
63PoC for CVE-2022-1388 affecting F5 BIG-IP.https://github.com/nico989/CVE-2022-1388POC Details
64A remote code execution vulnerability exists in the iControl REST API feature of F5's BIG-IP product. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands with root privileges.https://github.com/gotr00t0day/CVE-2022-1388POC Details
65CVE-2022-1388 | F5 - Big IP Pre Auth RCE via '/mgmt/tm/util/bash' endpointhttps://github.com/Chocapikk/CVE-2022-1388POC Details
66cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCEhttps://github.com/forktheplanet/CVE-2022-1388POC Details
67Old weaponized CVE-2022-1388 exploit.https://github.com/impost0r/CVE-2022-1388POC Details
68Nonehttps://github.com/XiaomingX/CVE-2022-1388-pocPOC Details
69Nonehttps://github.com/XiaomingX/cve-2022-1388-pocPOC Details
70F5 BIG-IP iControl REST API discovered and may be vulnerable to an authentication bypass (not tested). https://github.com/projectdiscovery/nuclei-templates/blob/main/http/exposed-panels/bigip-rest-panel.yamlPOC Details
71F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, may allow undisclosed requests to bypass iControl REST authentication. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-1388.yamlPOC Details
72Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/F5%20BIG-IP%20iControl%20REST%E8%BA%AB%E4%BB%BD%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2022-1388.mdPOC Details
73Nonehttps://github.com/r0otk3r/CVE-2022-1388POC Details
74cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCEhttps://github.com/ThinkingOffensively/CVE-2022-1388POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-1388
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-1388

No comments yet


Leave a comment