Esta página ainda não foi traduzida para o seu idioma. Exibindo conteúdo em inglês enquanto trabalhamos nisso.
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-39459: RCE in F5 BIG-IP via iControl REST
Plataforma
linux
Componente
bigip
Corrigido em
21.0.0.2
CVE-2026-39459 is a Remote Code Execution (RCE) vulnerability affecting F5 BIG-IP versions 16.1.0 through 21.0.0.2. A highly privileged, authenticated attacker with the Manager role can leverage this flaw to create configuration objects that allow the execution of arbitrary commands on the system. This vulnerability is rated HIGH severity (CVSS 7.2) and requires immediate attention to prevent potential compromise.
Impacto e Cenários de Ataquetraduzindo…
Successful exploitation of CVE-2026-39459 allows an attacker to gain complete control over the affected BIG-IP system. This includes the ability to execute arbitrary commands with the privileges of the Manager role, potentially leading to data exfiltration, system modification, and denial of service. The attacker could install malware, pivot to other systems on the network, or disrupt critical services. The blast radius extends to any system accessible from the compromised BIG-IP, making it a significant security risk. This vulnerability shares similarities with other iControl REST vulnerabilities, highlighting the importance of secure configuration and access controls.
Contexto de Exploraçãotraduzindo…
CVE-2026-39459 was published on May 13, 2026. Its severity is pending evaluation for inclusion on the CISA Known Exploited Vulnerabilities (KEV) catalog. Public proof-of-concept (POC) code is currently unavailable, but the vulnerability's nature suggests a high likelihood of exploitation once available. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.
Inteligência de Ameaças
Status do Exploit
CISA SSVC
Vetor CVSS
O que significam essas métricas?
- Attack Vector
- Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
- Attack Complexity
- Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
- Privileges Required
- Alto — conta de administrador ou privilegiada necessária.
- User Interaction
- Nenhuma — ataque automático e silencioso. A vítima não faz nada.
- Scope
- Inalterado — impacto limitado ao componente vulnerável.
- Confidentiality
- Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
- Integrity
- Alto — o atacante pode escrever, modificar ou excluir qualquer dado.
- Availability
- Alto — falha completa ou esgotamento de recursos. Negação de serviço total.
Software Afetado
Classificação de Fraqueza (CWE)
Linha do tempo
- Reservado
- Publicada
- Modificada
Mitigação e Soluções Alternativastraduzindo…
The primary mitigation for CVE-2026-39459 is to upgrade to F5 BIG-IP version 21.0.0.2 or later, which contains the fix. If immediate upgrade is not possible, consider implementing temporary workarounds such as restricting access to the iControl REST interface to trusted sources only. Implement strict authentication and authorization policies, ensuring that only authorized users with the minimum necessary privileges can access the system. Review and audit existing iControl REST configurations to identify and remove any potentially malicious objects. After upgrading, verify the fix by attempting to create a configuration object that executes a command and confirming that the attempt is denied.
Como corrigirtraduzindo…
Actualice a una versión corregida de F5 BIG-IP. Las versiones corregidas son 21.0.0.2, 17.5.1.6 y 17.1.3.2. Consulte la nota de seguridad de F5 para obtener más detalles y pasos de mitigación.
Perguntas frequentestraduzindo…
What is CVE-2026-39459 — RCE in F5 BIG-IP?
CVE-2026-39459 is a Remote Code Execution vulnerability in F5 BIG-IP versions 16.1.0–21.0.0.2. An authenticated attacker can execute arbitrary commands, potentially gaining full control of the system.
Am I affected by CVE-2026-39459 in F5 BIG-IP?
You are affected if you are running F5 BIG-IP versions 16.1.0 through 21.0.0.2 and have not upgraded to a patched version. Check your BIG-IP version immediately.
How do I fix CVE-2026-39459 in F5 BIG-IP?
Upgrade to F5 BIG-IP version 21.0.0.2 or later. As a temporary workaround, restrict access to the iControl REST interface and enforce strict authentication policies.
Is CVE-2026-39459 being actively exploited?
While no public exploits are currently available, the vulnerability's nature suggests a high likelihood of exploitation. Monitor security advisories and threat intelligence feeds.
Where can I find the official F5 advisory for CVE-2026-39459?
Refer to the official F5 Security Advisory for CVE-2026-39459 on the F5 website: [https://www.f5.com/security/center/advisory/f5-security-advisory-39459](https://www.f5.com/security/center/advisory/f5-security-advisory-39459)
Seu projeto está afetado?
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Experimente agora — sem conta
Faça upload de qualquer manifesto (composer.lock, package-lock.json, lista de plugins WordPress…) ou cole sua lista de componentes. Receba um relatório de vulnerabilidades instantaneamente. Fazer upload de um arquivo é só o começo: com uma conta, você obtém monitoramento contínuo, alertas por Slack/email, relatórios multiprojeto e white-label.
Arraste e solte seu arquivo de dependências
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...