alert http any any -> $HOME_NET any (msg:"ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3"; flow:established,to_server; flowbits:set,ET.F5AuthBypass; http.method; content:!"GET"; http.uri; content:"/mgmt/tm"; startswith; http.header; content:"|20|YWRtaW46"; pcre:"/^Authorization\x3a\x20[^\r\n]*YWRtaW46/mi"; http.header_names; content:!"|0d 0a|Referer|0d 0a|"; nocase; content:"X-F5-Auth-Token"; nocase; fast_pattern; threshold:type limit, count 1, seconds 60, track by_src; reference:cve,2022-1388; classtype:attempted-admin; sid:2049256; rev:1; metadata:affected_product F5, attack_target Web_Server, created_at 2023_11_20, cve CVE_2022_1388, deployment Perimeter, deployment SSLDecrypt, former_category EXPLOIT, performance_impact Low, signature_severity Major, updated_at 2023_11_20; target:dest_ip;)
Metadata | |
---|
affected_product | F5 |
attack_target | Web_Server |
created_at | 2023_11_20 |
cve | CVE_2022_1388 |
deployment | Perimeter |
deployment | SSLDecrypt |
former_category | EXPLOIT |
performance_impact | Low |
signature_severity | Major |
updated_at | 2023_11_20 |