Cette page n'a pas encore été traduite dans votre langue. Affichage du contenu en anglais pendant que nous y travaillons.
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-41953: Privilege Escalation in F5 BIG-IP
Plateforme
linux
Composant
bigip
Corrigé dans
21.0.0.2
CVE-2026-41953 describes a privilege escalation vulnerability within F5 BIG-IP systems. A successful exploit allows a highly privileged, authenticated attacker—specifically one possessing the Resource Administrator role—to modify configuration objects, leading to unauthorized privilege elevation. This vulnerability impacts BIG-IP versions ranging from 16.1.0 through 21.0.0.2. The vulnerability has been resolved in version 21.0.0.2.
Impact et Scénarios d'Attaquetraduction en cours…
The impact of CVE-2026-41953 is significant due to the potential for complete system compromise. An attacker who can successfully exploit this vulnerability gains the ability to modify critical configuration settings, potentially enabling them to bypass security controls, access sensitive data, and execute arbitrary code with elevated privileges. This could lead to data breaches, denial of service, or complete control over the affected BIG-IP system. The Resource Administrator role already holds considerable power, and this vulnerability amplifies that power, allowing for actions beyond the intended scope of that role. The ability to modify configuration objects opens the door to a wide range of malicious activities, effectively granting the attacker root-level access.
Contexte d'Exploitationtraduction en cours…
CVE-2026-41953 was published on May 13, 2026. Its severity is rated HIGH with a CVSS score of 8.7. As of this writing, there are no publicly available proof-of-concept exploits. The vulnerability is not currently listed on KEV or EPSS, suggesting a low to medium probability of active exploitation. Monitor F5's security advisories and CISA bulletins for updates regarding potential exploitation campaigns.
Renseignement sur les Menaces
Statut de l'Exploit
CISA SSVC
Vecteur CVSS
Que signifient ces métriques?
- Attack Vector
- Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
- Attack Complexity
- Faible — aucune condition spéciale requise. Exploitable de manière fiable.
- Privileges Required
- Élevé — un compte administrateur ou privilégié est requis.
- User Interaction
- Aucune — attaque automatique et silencieuse. La victime ne fait rien.
- Scope
- Modifié — l'attaque peut pivoter au-delà du composant vulnérable.
- Confidentiality
- Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
- Integrity
- Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
- Availability
- Aucun — aucun impact sur la disponibilité.
Logiciel Affecté
Classification de Faiblesse (CWE)
Chronologie
- Réservé
- Publiée
Mitigation et Contournementstraduction en cours…
The primary mitigation for CVE-2026-41953 is to upgrade to F5 BIG-IP version 21.0.0.2 or later. If immediate upgrade is not feasible, consider implementing stricter access controls to limit the number of users with the Resource Administrator role. Review existing configurations for any unusual or suspicious changes that may indicate exploitation. While a WAF or proxy cannot directly prevent this vulnerability, it can help detect and block malicious requests attempting to exploit it. Monitor BIG-IP logs for any unauthorized configuration modifications. After upgrading, verify the fix by attempting to modify a configuration object with a non-administrative user account and confirming that the action is denied.
Comment corrigertraduction en cours…
Actualice a una versión corregida de F5 BIG-IP. Las versiones corregidas son 21.0.0.2, 17.5.1.6 y 17.1.3.2. Consulte la documentación de F5 para obtener instrucciones detalladas sobre cómo actualizar.
Questions fréquentestraduction en cours…
What is CVE-2026-41953 — Privilege Escalation in F5 BIG-IP?
CVE-2026-41953 is a HIGH severity vulnerability affecting F5 BIG-IP versions 16.1.0–21.0.0.2. It allows an authenticated attacker with the Resource Administrator role to escalate privileges by modifying configuration objects, potentially leading to system compromise.
Am I affected by CVE-2026-41953 in F5 BIG-IP?
If you are running F5 BIG-IP versions 16.1.0 through 21.0.0.2, you are potentially affected. Check your version and upgrade as soon as possible to mitigate the risk.
How do I fix CVE-2026-41953 in F5 BIG-IP?
The recommended fix is to upgrade to F5 BIG-IP version 21.0.0.2 or later. If immediate upgrade is not possible, implement stricter access controls and monitor logs for suspicious activity.
Is CVE-2026-41953 being actively exploited?
As of the current assessment, there are no publicly available exploits and no reports of active exploitation. However, the vulnerability's severity warrants proactive mitigation.
Where can I find the official F5 BIG-IP advisory for CVE-2026-41953?
Refer to the official F5 Security Advisories page for the latest information and updates regarding CVE-2026-41953: [https://www.f5.com/services/security-advisories](https://www.f5.com/services/security-advisories)
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Essayez maintenant — sans compte
scanZone.subtitle
Glissez-déposez votre fichier de dépendances
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...