分析待ちCVE-2026-40631

CVE-2026-40631: Privilege Escalation in F5 BIG-IP

プラットフォーム

bigip

コンポーネント

bigip

修正版

21.0.0.2

CVE-2026-40631 describes a privilege escalation vulnerability in F5 BIG-IP. An authenticated administrator with the Resource Administrator or Administrator role can exploit this flaw to modify configuration objects through the iControl SOAP interface, leading to unauthorized privilege elevation. This vulnerability impacts versions 16.1.0 through 21.0.0.2. A fix is available in version 21.0.0.2.

影響と攻撃シナリオ翻訳中…

Successful exploitation of CVE-2026-40631 allows an attacker to gain elevated privileges within the F5 BIG-IP system. This could enable them to modify critical configurations, bypass security controls, and potentially gain complete control of the device. The attacker would need to be authenticated with either the Resource Administrator or Administrator role to exploit this vulnerability. The blast radius extends to any data or services managed by the BIG-IP, including web applications, load balancing configurations, and security policies. Compromise could lead to data breaches, denial of service, or further lateral movement within the network.

悪用の状況翻訳中…

CVE-2026-40631 is currently not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. The EPSS score is pending evaluation. Public proof-of-concept (POC) code is not currently available. The vulnerability was published on 2026-05-13. Monitor security advisories and threat intelligence feeds for any indications of active exploitation.

脅威インテリジェンス

エクスプロイト状況

概念実証不明
CISA KEVNO
インターネット露出

CISA SSVC

悪用状況none
自動化可能no
技術的影響total

CVSS ベクトル

脅威インテリジェンス· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N8.7HIGHAttack VectorNetwork攻撃者がターゲットに到達する方法Attack ComplexityLow悪用に必要な条件Privileges RequiredHigh攻撃に必要な認証レベルUser InteractionNone被害者の操作が必要かどうかScopeChanged影響コンポーネント外への波及ConfidentialityHigh機密データ漏洩のリスクIntegrityHigh不正データ改ざんのリスクAvailabilityNoneサービス障害のリスクnextguardhq.com · CVSS v3.1 基本スコア
これらのメトリクスの意味は?
Attack Vector
ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
Attack Complexity
低 — 特別な条件不要。安定して悪用可能。
Privileges Required
高 — 管理者または特権アカウントが必要。
User Interaction
なし — 自動かつ無音の攻撃。被害者は何もしない。
Scope
変化あり — 攻撃が脆弱なコンポーネントを超えて他のシステムに波及可能。
Confidentiality
高 — 機密性の完全喪失。全データが読み取り可能。
Integrity
高 — 任意のデータの書き込み・変更・削除が可能。
Availability
なし — 可用性への影響なし。

影響を受けるソフトウェア

コンポーネントbigip
ベンダーF5
最小バージョン16.1.0
最大バージョン21.0.0.2
修正版21.0.0.2

弱点分類 (CWE)

タイムライン

  1. 予約済み
  2. 公開日

緩和策と回避策翻訳中…

The primary mitigation for CVE-2026-40631 is to upgrade to F5 BIG-IP version 21.0.0.2 or later. If immediate upgrade is not possible, consider implementing stricter access controls to limit the number of users with Resource Administrator or Administrator privileges. Review iControl SOAP access and consider restricting it to only necessary users and systems. Implement Web Application Firewall (WAF) rules to detect and block suspicious iControl SOAP requests. Monitor iControl SOAP logs for unusual activity, specifically looking for configuration modification attempts from unauthorized sources. After upgrade, confirm the fix by attempting to modify a configuration object via iControl SOAP with a lower-privileged account; the modification should be denied.

修正方法翻訳中…

Aplique las actualizaciones de seguridad proporcionadas por F5 para BIG-IP. Consulte la nota de seguridad K000160979 en el sitio web de F5 para obtener más detalles sobre las versiones corregidas y el proceso de actualización.

よくある質問翻訳中…

What is CVE-2026-40631 — Privilege Escalation in F5 BIG-IP?

CVE-2026-40631 is a HIGH severity vulnerability allowing authenticated administrators to escalate privileges within F5 BIG-IP via iControl SOAP configuration manipulation, potentially granting unauthorized access.

Am I affected by CVE-2026-40631 in F5 BIG-IP?

You are affected if you are running F5 BIG-IP versions 16.1.0 through 21.0.0.2. Check your version and upgrade accordingly.

How do I fix CVE-2026-40631 in F5 BIG-IP?

Upgrade to F5 BIG-IP version 21.0.0.2 or later. As a temporary workaround, restrict iControl SOAP access and tighten user privileges.

Is CVE-2026-40631 being actively exploited?

There are currently no public reports of active exploitation, but monitoring for activity is recommended.

Where can I find the official F5 advisory for CVE-2026-40631?

Refer to the official F5 Security Advisory for CVE-2026-40631 on the F5 website (check F5's security portal for the latest advisory).

あなたのプロジェクトは影響を受けていますか?

依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。

scanZone.liveBadgescanZone.eyebrow

今すぐ試す — アカウント不要

Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.

手動スキャンSlack/メールアラートContinuous monitoringホワイトラベルレポート

依存関係ファイルをドラッグ&ドロップ

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...