ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3Source: et/open
alert http any any -> $HOME_NET any (msg:"ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3"; flow:established,to_server; flowbits:set,ET.F5AuthBypass; http.method; content:!"GET"; http.uri; content:"/mgmt/tm"; startswith; http.header; content:"|20|YWRtaW46"; pcre:"/^Authorization\x3a\x20[^\r\n]*YWRtaW46/mi"; http.header_names; content:!"|0d 0a|Referer|0d 0a|"; nocase; content:"X-F5-Auth-Token"; nocase; fast_pattern; threshold:type limit, count 1, seconds 60, track by_src; reference:cve,2022-1388; classtype:attempted-admin; sid:2049256; rev:1; metadata:affected_product F5, attack_target Web_Server, created_at 2023_11_20, cve CVE_2022_1388, deployment Perimeter, deployment SSLDecrypt, former_category EXPLOIT, performance_impact Low, signature_severity Major, updated_at 2023_11_20; target:dest_ip;)
Reference
CVECVE-2022-1388
Metadata
affected_productF5
attack_targetWeb_Server
created_at2023_11_20
cveCVE_2022_1388
deploymentPerimeter
deploymentSSLDecrypt
former_categoryEXPLOIT
performance_impactLow
signature_severityMajor
updated_at2023_11_20
FlowbitAction
ET.F5AuthBypassset