Deze pagina is nog niet vertaald naar uw taal. We werken eraan — de inhoud wordt voorlopig in het Engels weergegeven.
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-41225: RCE in F5 BIG-IP 16.1.0-21.0.0.2
Platform
linux
Component
bigip
Opgelost in
21.0.0.2
CVE-2026-41225 is a Remote Code Execution (RCE) vulnerability affecting F5 BIG-IP versions 16.1.0 through 21.0.0.2. A highly privileged, authenticated attacker can leverage this flaw to create malicious configuration objects, ultimately enabling the execution of arbitrary commands on the system. This vulnerability has a CVSS score of 7.2 (HIGH) and is addressed in version 21.0.0.2.
Impact en Aanvalsscenarioswordt vertaald…
The impact of CVE-2026-41225 is severe, as it allows an authenticated attacker with Manager role access to gain complete control over the affected BIG-IP system. An attacker could use this RCE to install malware, steal sensitive data, modify configurations, or disrupt services. This could lead to a complete compromise of the network infrastructure, particularly if the BIG-IP device is used for critical traffic management or security functions. The ability to execute arbitrary commands effectively grants the attacker root-level privileges, allowing for extensive lateral movement within the network and potentially impacting other connected systems. The potential for data exfiltration and service disruption is significant.
Uitbuitingscontextwordt vertaald…
CVE-2026-41225 was published on May 13, 2026. Its severity is currently pending evaluation for inclusion on the CISA Known Exploited Vulnerabilities (KEV) catalog. The EPSS score is likely to be medium or high given the RCE nature and the relatively easy authentication requirement (Manager role). Public proof-of-concept (POC) code is currently unavailable, but the vulnerability's ease of exploitation makes it a likely target for exploitation in the wild. Refer to the official F5 advisory for the most up-to-date information.
Dreigingsinformatie
Exploit Status
CISA SSVC
CVSS-vector
Wat betekenen deze metrics?
- Attack Vector
- Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
- Attack Complexity
- Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
- Privileges Required
- Hoog — beheerder of geprivilegieerd account vereist.
- User Interaction
- Geen — automatische en stille aanval. Slachtoffer doet niets.
- Scope
- Ongewijzigd — impact beperkt tot het kwetsbare component.
- Confidentiality
- Hoog — volledig verlies van vertrouwelijkheid. Aanvaller kan alle gegevens lezen.
- Integrity
- Hoog — aanvaller kan alle gegevens schrijven, aanpassen of verwijderen.
- Availability
- Hoog — volledige crash of uitputting van resources. Totale denial of service.
Getroffen Software
Zwakheidsclassificatie (CWE)
Tijdlijn
- Gereserveerd
- Gepubliceerd
- Gewijzigd
Mitigatie en Workaroundswordt vertaald…
The primary mitigation for CVE-2026-41225 is to upgrade to F5 BIG-IP version 21.0.0.2 or later. If an immediate upgrade is not possible due to compatibility concerns or testing requirements, consider implementing temporary workarounds. Restricting access to the iControl REST interface to only authorized personnel is crucial. Implement strict access controls and multi-factor authentication for all user accounts with Manager role privileges. Monitor iControl REST logs for suspicious activity, specifically looking for attempts to create or modify configuration objects. While a WAF or proxy cannot directly prevent this vulnerability, it can help detect and block malicious requests targeting the iControl REST interface. After upgrading, confirm the vulnerability is resolved by attempting to create a configuration object via iControl REST with a privileged user account; the attempt should be rejected.
Hoe te verhelpenwordt vertaald…
Actualice a una versión corregida de F5 BIG-IP. Las versiones afectadas incluyen 16.1.0, 17.1.0 a 17.1.3.1, 17.5.0, 21.0.0 a 21.0.0.1 y 21.1.0. Consulte la documentación de F5 para obtener instrucciones detalladas de actualización y mitigaciones temporales.
Veelgestelde vragenwordt vertaald…
What is CVE-2026-41225 — RCE in F5 BIG-IP?
CVE-2026-41225 is a Remote Code Execution vulnerability in F5 BIG-IP versions 16.1.0–21.0.0.2. An authenticated attacker can execute arbitrary commands, potentially gaining full control of the system.
Am I affected by CVE-2026-41225 in F5 BIG-IP?
You are affected if you are running F5 BIG-IP versions 16.1.0 through 21.0.0.2 and have not upgraded to a patched version. Versions reaching End of Technical Support (EoTS) are not evaluated.
How do I fix CVE-2026-41225 in F5 BIG-IP?
Upgrade to F5 BIG-IP version 21.0.0.2 or later. If immediate upgrade is not possible, restrict access to iControl REST and monitor logs.
Is CVE-2026-41225 being actively exploited?
While no public exploits are currently available, the vulnerability's ease of exploitation suggests it is a likely target for exploitation in the wild.
Where can I find the official F5 advisory for CVE-2026-41225?
Refer to the official F5 security advisory for CVE-2026-41225 on the F5 website: [https://www.f5.com/security/center/advisory/f5-security-advisory-41225](https://www.f5.com/security/center/advisory/f5-security-advisory-41225)
Is jouw project getroffen?
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.
Probeer het nu — geen account
Upload een manifest (composer.lock, package-lock.json, WordPress pluginlijst…) of plak uw componentenlijst. U ontvangt direct een kwetsbaarheidsrapport. Een bestand uploaden is slechts het begin: met een account krijgt u continue monitoring, Slack/e-mail alerts, multi-project en white-label rapporten.
Sleep uw afhankelijkheidsbestand hierheen
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...