分析待ちCVE-2026-41953

CVE-2026-41953: Privilege Escalation in F5 BIG-IP

プラットフォーム

linux

コンポーネント

bigip

修正版

21.0.0.2

CVE-2026-41953 describes a privilege escalation vulnerability within F5 BIG-IP systems. A successful exploit allows a highly privileged, authenticated attacker—specifically one possessing the Resource Administrator role—to modify configuration objects, leading to unauthorized privilege elevation. This vulnerability impacts BIG-IP versions ranging from 16.1.0 through 21.0.0.2. The vulnerability has been resolved in version 21.0.0.2.

影響と攻撃シナリオ翻訳中…

The impact of CVE-2026-41953 is significant due to the potential for complete system compromise. An attacker who can successfully exploit this vulnerability gains the ability to modify critical configuration settings, potentially enabling them to bypass security controls, access sensitive data, and execute arbitrary code with elevated privileges. This could lead to data breaches, denial of service, or complete control over the affected BIG-IP system. The Resource Administrator role already holds considerable power, and this vulnerability amplifies that power, allowing for actions beyond the intended scope of that role. The ability to modify configuration objects opens the door to a wide range of malicious activities, effectively granting the attacker root-level access.

悪用の状況翻訳中…

CVE-2026-41953 was published on May 13, 2026. Its severity is rated HIGH with a CVSS score of 8.7. As of this writing, there are no publicly available proof-of-concept exploits. The vulnerability is not currently listed on KEV or EPSS, suggesting a low to medium probability of active exploitation. Monitor F5's security advisories and CISA bulletins for updates regarding potential exploitation campaigns.

脅威インテリジェンス

エクスプロイト状況

概念実証不明
CISA KEVNO
インターネット露出
レポート1 脅威レポート

CISA SSVC

悪用状況none
自動化可能no
技術的影響total

CVSS ベクトル

脅威インテリジェンス· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N8.7HIGHAttack VectorNetwork攻撃者がターゲットに到達する方法Attack ComplexityLow悪用に必要な条件Privileges RequiredHigh攻撃に必要な認証レベルUser InteractionNone被害者の操作が必要かどうかScopeChanged影響コンポーネント外への波及ConfidentialityHigh機密データ漏洩のリスクIntegrityHigh不正データ改ざんのリスクAvailabilityNoneサービス障害のリスクnextguardhq.com · CVSS v3.1 基本スコア
これらのメトリクスの意味は?
Attack Vector
ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
Attack Complexity
低 — 特別な条件不要。安定して悪用可能。
Privileges Required
高 — 管理者または特権アカウントが必要。
User Interaction
なし — 自動かつ無音の攻撃。被害者は何もしない。
Scope
変化あり — 攻撃が脆弱なコンポーネントを超えて他のシステムに波及可能。
Confidentiality
高 — 機密性の完全喪失。全データが読み取り可能。
Integrity
高 — 任意のデータの書き込み・変更・削除が可能。
Availability
なし — 可用性への影響なし。

影響を受けるソフトウェア

コンポーネントbigip
ベンダーF5
最小バージョン16.1.0
最大バージョン21.0.0.2
修正版21.0.0.2

弱点分類 (CWE)

タイムライン

  1. 予約済み
  2. 公開日

緩和策と回避策翻訳中…

The primary mitigation for CVE-2026-41953 is to upgrade to F5 BIG-IP version 21.0.0.2 or later. If immediate upgrade is not feasible, consider implementing stricter access controls to limit the number of users with the Resource Administrator role. Review existing configurations for any unusual or suspicious changes that may indicate exploitation. While a WAF or proxy cannot directly prevent this vulnerability, it can help detect and block malicious requests attempting to exploit it. Monitor BIG-IP logs for any unauthorized configuration modifications. After upgrading, verify the fix by attempting to modify a configuration object with a non-administrative user account and confirming that the action is denied.

修正方法翻訳中…

Actualice a una versión corregida de F5 BIG-IP. Las versiones corregidas son 21.0.0.2, 17.5.1.6 y 17.1.3.2. Consulte la documentación de F5 para obtener instrucciones detalladas sobre cómo actualizar.

よくある質問翻訳中…

What is CVE-2026-41953 — Privilege Escalation in F5 BIG-IP?

CVE-2026-41953 is a HIGH severity vulnerability affecting F5 BIG-IP versions 16.1.0–21.0.0.2. It allows an authenticated attacker with the Resource Administrator role to escalate privileges by modifying configuration objects, potentially leading to system compromise.

Am I affected by CVE-2026-41953 in F5 BIG-IP?

If you are running F5 BIG-IP versions 16.1.0 through 21.0.0.2, you are potentially affected. Check your version and upgrade as soon as possible to mitigate the risk.

How do I fix CVE-2026-41953 in F5 BIG-IP?

The recommended fix is to upgrade to F5 BIG-IP version 21.0.0.2 or later. If immediate upgrade is not possible, implement stricter access controls and monitor logs for suspicious activity.

Is CVE-2026-41953 being actively exploited?

As of the current assessment, there are no publicly available exploits and no reports of active exploitation. However, the vulnerability's severity warrants proactive mitigation.

Where can I find the official F5 BIG-IP advisory for CVE-2026-41953?

Refer to the official F5 Security Advisories page for the latest information and updates regarding CVE-2026-41953: [https://www.f5.com/services/security-advisories](https://www.f5.com/services/security-advisories)

あなたのプロジェクトは影響を受けていますか?

依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。

scanZone.liveBadgescanZone.eyebrow

今すぐ試す — アカウント不要

Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.

手動スキャンSlack/メールアラートContinuous monitoringホワイトラベルレポート

依存関係ファイルをドラッグ&ドロップ

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...