CVE-2026-42924: Privilege Escalation in F5 BIG-IP
プラットフォーム
linux
コンポーネント
bigip
修正版
21.0.0.1
CVE-2026-42924 describes a privilege escalation vulnerability in F5 BIG-IP. An authenticated administrator with the Resource Administrator or Administrator role can exploit this flaw through iControl SOAP to gain elevated privileges. This impacts versions 16.1.0 through 21.0.0.1, and a fix is available in version 21.0.0.1.
影響と攻撃シナリオ翻訳中…
Successful exploitation of CVE-2026-42924 allows an attacker to elevate their privileges within the F5 BIG-IP environment. This means an attacker who already has basic administrative access could gain full control over the system, potentially leading to data breaches, denial of service, or complete system compromise. The ability to manipulate SNMP configuration objects through iControl SOAP provides a direct pathway to escalate privileges, bypassing standard access controls. The impact is significant, as it allows an attacker to operate with the highest level of permissions on the BIG-IP device.
悪用の状況翻訳中…
CVE-2026-42924 was published on May 13, 2026. The vulnerability's exploitation probability is currently assessed as medium, given the requirement for authenticated access. Public proof-of-concept (POC) code is not yet available, but the vulnerability's nature suggests it could be relatively straightforward to exploit once a POC is released. The NVD and CISA advisories are pending, but the HIGH CVSS score indicates a serious risk.
脅威インテリジェンス
エクスプロイト状況
CISA SSVC
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
- Attack Complexity
- 低 — 特別な条件不要。安定して悪用可能。
- Privileges Required
- 高 — 管理者または特権アカウントが必要。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化あり — 攻撃が脆弱なコンポーネントを超えて他のシステムに波及可能。
- Confidentiality
- 高 — 機密性の完全喪失。全データが読み取り可能。
- Integrity
- 高 — 任意のデータの書き込み・変更・削除が可能。
- Availability
- なし — 可用性への影響なし。
影響を受けるソフトウェア
弱点分類 (CWE)
タイムライン
- 予約済み
- 公開日
緩和策と回避策翻訳中…
The primary mitigation for CVE-2026-42924 is to upgrade to F5 BIG-IP version 21.0.0.1 or later, which contains the fix. If an immediate upgrade is not feasible, consider implementing stricter access controls within iControl SOAP to limit the ability of administrators to create SNMP configuration objects. Review existing SNMP configurations for any anomalies. While not a direct fix, restricting access to the iControl SOAP interface can reduce the attack surface. After upgrade, confirm the vulnerability is resolved by attempting to create an SNMP configuration object via iControl SOAP with a lower-privileged account.
修正方法翻訳中…
Actualice a una versión corregida de F5 BIG-IP. Las versiones corregidas son 17.5.1.4, 21.0.0.1 y versiones posteriores de 21.1.0. Consulte la nota de seguridad de F5 para obtener más detalles y las versiones específicas afectadas.
よくある質問翻訳中…
What is CVE-2026-42924 — Privilege Escalation in F5 BIG-IP?
CVE-2026-42924 is a HIGH severity vulnerability in F5 BIG-IP allowing authenticated administrators to escalate privileges via iControl SOAP, potentially gaining full control of the system. It affects versions 16.1.0–21.0.0.1.
Am I affected by CVE-2026-42924 in F5 BIG-IP?
You are affected if you are running F5 BIG-IP versions 16.1.0 through 21.0.0.1 and have not upgraded. Verify your version and apply the necessary patch immediately.
How do I fix CVE-2026-42924 in F5 BIG-IP?
Upgrade to F5 BIG-IP version 21.0.0.1 or later to patch the vulnerability. If immediate upgrade is not possible, restrict access to iControl SOAP.
Is CVE-2026-42924 being actively exploited?
While no active exploitation campaigns have been publicly confirmed, the vulnerability's nature suggests it could be exploited once a proof-of-concept is released. Monitor for suspicious activity.
Where can I find the official F5 advisory for CVE-2026-42924?
Refer to the official F5 Security Advisory for CVE-2026-42924, which will be published on the F5 website once available (check https://www.f5.com/security/center).
今すぐ試す — アカウント不要
Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.
依存関係ファイルをドラッグ&ドロップ
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...