CVE-2022-1388 Overview
CVE-2022-1388 is a critical authentication bypass vulnerability affecting F5 BIG-IP devices. The vulnerability exists in the iControl REST interface, where specially crafted requests can bypass authentication mechanisms, allowing unauthenticated attackers to execute arbitrary system commands with root privileges. This vulnerability affects multiple BIG-IP product modules across versions 16.1.x prior to 16.1.2.2, 15.1.x prior to 15.1.5.1, 14.1.x prior to 14.1.4.6, 13.1.x prior to 13.1.5, and all 12.1.x and 11.6.x versions.
Critical Impact
This vulnerability enables unauthenticated remote code execution on F5 BIG-IP devices, which are commonly deployed as critical network infrastructure components including load balancers, application delivery controllers, and firewalls. Successful exploitation can lead to complete system compromise with root-level access.
Affected Products
- F5 BIG-IP Access Policy Manager (versions 11.6.x - 16.1.x)
- F5 BIG-IP Advanced Firewall Manager (versions 11.6.x - 16.1.x)
- F5 BIG-IP Analytics (versions 11.6.x - 16.1.x)
- F5 BIG-IP Application Acceleration Manager (versions 11.6.x - 16.1.x)
- F5 BIG-IP Application Security Manager (versions 11.6.x - 16.1.x)
- F5 BIG-IP Domain Name System (versions 11.6.x - 16.1.x)
- F5 BIG-IP Fraud Protection Service (versions 11.6.x - 16.1.x)
- F5 BIG-IP Global Traffic Manager (versions 11.6.x - 16.1.x)
- F5 BIG-IP Link Controller (versions 11.6.x - 16.1.x)
- F5 BIG-IP Local Traffic Manager (versions 11.6.x - 16.1.x)
- F5 BIG-IP Policy Enforcement Manager (versions 11.6.x - 16.1.x)
Discovery Timeline
- 2022-05-05 - CVE-2022-1388 published to NVD
- 2025-10-27 - Last updated in NVD database
Technical Details for CVE-2022-1388
Vulnerability Analysis
This vulnerability is classified under CWE-306 (Missing Authentication for Critical Function). The iControl REST API in F5 BIG-IP devices fails to properly authenticate certain requests, allowing attackers to bypass the authentication layer entirely. The flaw resides in how the management interface processes specific HTTP request patterns, particularly those involving the X-F5-Auth-Token header and connection handling.
The vulnerability is particularly dangerous because F5 BIG-IP devices are commonly deployed at the network perimeter to handle critical traffic management functions. Successful exploitation grants attackers the ability to execute arbitrary commands with root privileges, enabling complete device takeover. This can be leveraged to intercept sensitive traffic, pivot to internal networks, deploy ransomware, or establish persistent backdoors.
This vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating confirmed exploitation in the wild. Multiple public exploits are available, including those documented on Packet Storm Security.
Root Cause
The root cause of CVE-2022-1388 is a missing authentication check in the iControl REST interface. When processing requests through the Apache/HTTPD reverse proxy to the backend REST service, certain request configurations cause the authentication validation to be bypassed. Specifically, manipulating the Connection and X-F5-Auth-Token headers in conjunction with specific hop-by-hop header handling allows requests to reach the backend service without proper credential verification.
Attack Vector
The attack vector is network-based and requires no authentication or user interaction. Attackers can exploit this vulnerability by sending specially crafted HTTP requests to the BIG-IP management interface (typically on port 443 or the self-IP management port). The attack manipulates HTTP headers to trick the reverse proxy into forwarding requests without proper authentication.
The exploitation technique involves sending requests to the /mgmt/tm/util/bash endpoint with manipulated headers including a blank X-F5-Auth-Token, a Connection header set to X-F5-Auth-Token, and additional hop-by-hop header manipulation. This causes the authentication token header to be removed during proxy processing while still allowing the request to reach the backend service, which then processes it as an authenticated request.
Detection Methods for CVE-2022-1388
Indicators of Compromise
- Unexpected HTTP POST requests to /mgmt/tm/util/bash or similar iControl REST endpoints from external IP addresses
- HTTP requests containing unusual Connection header values, particularly those referencing X-F5-Auth-Token
- Log entries showing command execution via the REST API without corresponding successful authentication events
- Evidence of new user accounts, SSH keys, or cron jobs created on BIG-IP devices without administrative action
Detection Strategies
- Monitor BIG-IP /var/log/restjavad.0.log and /var/log/ltm for suspicious API access patterns and unauthorized command execution
- Implement network monitoring rules to detect HTTP requests to management interfaces containing X-F5-Auth-Token in the Connection header
- Deploy SentinelOne Singularity to detect post-exploitation activities including reverse shell establishment and persistence mechanisms
- Review F5 audit logs for authentication anomalies and unexpected administrative actions
Monitoring Recommendations
- Restrict management interface access to trusted networks and implement allowlist-based access controls
- Enable detailed logging on BIG-IP devices and forward logs to a SIEM for centralized analysis
- Monitor for network connections from BIG-IP management interfaces to unexpected external destinations
- Implement file integrity monitoring on critical BIG-IP configuration files and system binaries
How to Mitigate CVE-2022-1388
Immediate Actions Required
- Apply the appropriate patch immediately for your BIG-IP version: upgrade to 16.1.2.2, 15.1.5.1, 14.1.4.6, or 13.1.5 depending on your current version branch
- Block all access to the iControl REST interface from untrusted networks as an immediate temporary measure
- If patching is not immediately possible, implement the workarounds provided by F5 in Security Advisory K23605346
- Review BIG-IP systems for indicators of compromise before and after applying patches
Patch Information
F5 has released security patches addressing CVE-2022-1388. Organizations should upgrade to the following fixed versions based on their current deployment:
| Current Version Branch | Fixed Version |
|---|---|
| 16.1.x | 16.1.2.2 |
| 15.1.x | 15.1.5.1 |
| 14.1.x | 14.1.4.6 |
| 13.1.x | 13.1.5 |
| 12.1.x | No fix available (EoTS) |
| 11.6.x | No fix available (EoTS) |
For versions 12.1.x and 11.6.x that have reached End of Technical Support (EoTS), F5 recommends upgrading to a supported version. Detailed patch information and download links are available in the F5 Support Article K23605346.
Workarounds
- Block iControl REST access through the self IP address by modifying the PortLockdown settings to disallow access to the management interface
- Block iControl REST access through the management interface by modifying the httpd configuration to restrict allowed source IP addresses
- Modify the BIG-IP httpd configuration to require authentication for all REST API endpoints by adding configuration directives to /config/httpd/conf.d/
# Example: Restrict management interface access to specific IP addresses
# Add to /config/bigip_base.conf or via tmsh
tmsh modify sys httpd allow { 10.0.0.0/8 192.168.1.0/24 }
tmsh save sys config
# Block access via self IP (run from tmsh)
tmsh modify net self <self_ip_name> port-lockdown none
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


