Overview
CVE-2022-1388 is a critical authentication bypass vulnerability in F5 BIG-IP's iControl REST API. By sending HTTP requests with specific manipulated headers, an unauthenticated attacker can bypass authentication and execute arbitrary OS commands as root on the BIG-IP appliance. Because BIG-IP is a network security appliance providing load balancing, SSL inspection, and application delivery, its compromise gives attackers a privileged position to intercept traffic, modify application responses, and pivot into protected network segments.
Exploitation began within 48 hours of F5's advisory, with PoCs published by multiple research teams on May 8, 2022. The vulnerability is straightforward to exploit — a single crafted HTTP request — and mass exploitation was observed within days.
What Is F5 BIG-IP?
F5 BIG-IP is a family of network appliances providing application delivery, load balancing, SSL/TLS offloading, web application firewall (WAF), and DDoS protection. BIG-IP appliances sit in front of application servers, making them highly privileged network infrastructure with visibility into all traffic they process. The iControl REST API is BIG-IP's management API, used for configuration, automation, and integration. It is accessible on the same management IP as the TMUI (Traffic Management User Interface) web portal.
Affected Versions
| BIG-IP Version | Vulnerable | Fixed Version |
|---|---|---|
| 16.1.x | 16.1.0 – 16.1.2 | 16.1.2.2 |
| 15.1.x | 15.1.0 – 15.1.5 | 15.1.5.1 |
| 14.1.x | 14.1.0 – 14.1.4 | 14.1.4.6 |
| 13.1.x | 13.1.0 – 13.1.4 | 13.1.4.1 |
| 12.1.x | 12.1.0 – 12.1.6 | End-of-life — no patch |
| 11.6.x | 11.6.0 – 11.6.5 | End-of-life — no patch |
BIG-IP 17.x was not affected. BIG-IP versions 11.x and 12.x are end-of-life and received no patches.
Technical Details
Root Cause: Authentication Bypass via HTTP Header Manipulation
The iControl REST API authentication is implemented as a middleware layer that validates credentials before forwarding requests to the underlying REST endpoints. The bypass exploits how BIG-IP processes certain HTTP headers when the request is received:
The attack involves sending a request with:
- The
X-F5-Auth-Tokenheader set to an empty or malformed value - The
Connection: Keep-Alive, X-F5-Auth-Tokenheader (adding the auth token header to the Connection hop-by-hop headers list) - A
Hostheader pointing to the locallocalhostaddress
When BIG-IP processes these headers, the Connection header causes X-F5-Auth-Token to be treated as a hop-by-hop header and stripped before the authentication middleware evaluates it. The request then reaches the REST API backend without a valid token but with the appearance of an authenticated internal request (due to the localhost routing).
A typical exploit request:
POST /mgmt/tm/util/bash HTTP/1.1
Host: localhost
Connection: keep-alive, X-F5-Auth-Token
X-F5-Auth-Token: anything
X-Forwarded-For: 127.0.0.1
Content-Type: application/json
{"command":"run","utilCmdArgs":"-c 'id'"}
The /mgmt/tm/util/bash endpoint, once reached without authentication checks, executes the supplied bash command as root.
Attack Characteristics
| Attribute | Detail |
|---|---|
| Attack Vector | Network — iControl REST API (HTTPS port 443 or 8443 on management IP) |
| Authentication Required | None — single crafted HTTP request |
| Code Execution | Root on the BIG-IP appliance OS |
| Management Interface Exposed | Must be accessible from attacker network — internet exposure is a misconfiguration |
| Impact on Traffic | Attacker with root on BIG-IP can modify traffic, exfiltrate SSL keys, alter load balancer rules |
Discovery
CVE-2022-1388 was discovered by F5 internal security teams and by independent security researchers. F5 released patches on May 4, 2022, and published the advisory on May 5. Within three days, Horizon3.ai and other security firms published working PoC exploits. The simplicity of the exploit — a single HTTP request with specific headers — meant that weaponization was trivial once the advisory provided sufficient detail for reverse engineering.
Exploitation Context
- Mass exploitation within 48–72 hours of advisory publication
- Threat actors: Nation-state groups (Iranian APT groups were among the first confirmed exploiters), criminal threat actors, and ransomware operators
- Common payloads: Webshell deployment to the BIG-IP management interface, SSH key injection (
/root/.ssh/authorized_keys), credential harvesting from BIG-IP configuration files (which contain SSL private keys, backend server credentials, and LDAP/AD integration credentials) - Traffic interception capability: An attacker with root on BIG-IP can insert themselves into all traffic the appliance processes — including decrypting SSL traffic it terminates
- Ransomware use: Multiple ransomware operators used CVE-2022-1388 for initial access in enterprises where BIG-IP was the internet edge
- Exposure: Approximately 16,000 BIG-IP management interfaces were estimated to be internet-accessible (a misconfiguration — F5 explicitly recommends against this)
Remediation
Recommended Actions
-
Apply the F5 patch immediately. Fixed versions are listed in the table above. BIG-IP 11.x and 12.x are end-of-life — upgrade to a supported version.
-
Restrict access to the iControl REST API and TMUI. The management interface (iControl REST, TMUI web portal) should never be internet-accessible. Restrict to a dedicated management network accessible only from authorized management workstations:
# Block external access to management ports modify /sys httpd allow add { 10.0.0.0/8 } -
Rotate all credentials stored on or processed by BIG-IP — SSL private keys, service account credentials in BIG-IP configuration, LDAP/AD integration credentials, and any secrets stored in iRules or data groups.
-
Check for post-exploitation persistence:
- Look for unexpected SSH keys in
/root/.ssh/authorized_keys - Check for unexpected files in
/var/www/,/etc/httpd/, or BIG-IP virtual server directories - Review bash history for root:
cat /root/.bash_history - Check for unexpected cron jobs:
crontab -l; ls /etc/cron*
- Look for unexpected SSH keys in
-
Rotate SSL private keys — BIG-IP terminates SSL for applications it proxies; if the appliance was compromised, all private keys it holds should be considered exposed and re-issued.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2022-1388 |
| Vendor / Product | F5 — BIG-IP |
| NVD Published | 2022-05-05 |
| NVD Last Modified | 2025-10-27 |
| CVSS 3.1 Score | 9.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-306 — Missing Authentication for Critical Function |
| CISA KEV Added | 2022-05-10 |
| CISA KEV Deadline | 2022-05-31 |
| Known Ransomware Use | ⚠️ Yes |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2022-05-04 | F5 releases patches for CVE-2022-1388 across all affected BIG-IP versions |
| 2022-05-05 | CVE-2022-1388 published; F5 security advisory K23605346 released |
| 2022-05-08 | Multiple public PoC exploits released; active exploitation confirmed within 48 hours of advisory |
| 2022-05-10 | CISA adds CVE-2022-1388 to KEV catalog |
| 2022-05-31 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2022-1388 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| F5 Security Advisory K23605346 — CVE-2022-1388 | Vendor Advisory |
| CVE-2022-1388 PoC — Horizon3.ai | Security Research |
| BleepingComputer: F5 Warns of Critical BIG-IP Vulnerability Allowing Device Takeover | Security Research |
| Tenable: CVE-2022-1388 F5 BIG-IP Authentication Bypass Analysis | Security Research |
| CWE-306 — Missing Authentication for Critical Function | Weakness Classification |