Skip to main content

CVE-2022-41770: CWE-400 Uncontrolled Resource Consumption in F5 BIG-IP

Medium
VulnerabilityCVE-2022-41770cvecve-2022-41770cwe-400
Published: Wed Oct 19 2022 (10/19/2022, 21:21:48 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP

Description

In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, 14.1.x before 14.1.5.1, and all versions of 13.1.x, and BIG-IQ all versions of 8.x and 7.x, an authenticated iControl REST user can cause an increase in memory resource utilization, via undisclosed requests.

AI-Powered Analysis

AILast updated: 07/05/2025, 05:27:48 UTC

Technical Analysis

CVE-2022-41770 is a medium-severity vulnerability affecting multiple versions of F5 BIG-IP and BIG-IQ products. The vulnerability is classified under CWE-400, which pertains to uncontrolled resource consumption. Specifically, an authenticated user with access to the iControl REST interface can send crafted requests that cause an increase in memory utilization on the affected systems. The affected BIG-IP versions include 17.0.x prior to 17.0.0.1, 16.1.x prior to 16.1.3.1, 15.1.x prior to 15.1.7, 14.1.x prior to 14.1.5.1, and all versions of 13.1.x. Additionally, all versions of BIG-IQ 7.x and 8.x are impacted. The vulnerability does not disclose the exact nature of the requests that cause the memory increase, but the impact is a denial-of-service (DoS) condition due to resource exhaustion. The CVSS v3.1 score is 6.5, reflecting a medium severity with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), but high impact on availability (A:H). No known exploits in the wild have been reported to date. The vulnerability requires authentication, which limits the attack surface to users with valid credentials or compromised accounts. The iControl REST interface is commonly used for automation and management of BIG-IP devices, which are widely deployed as application delivery controllers, load balancers, and security gateways in enterprise and service provider networks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on F5 BIG-IP and BIG-IQ devices for critical network infrastructure and application delivery. Exploitation could lead to denial of service by exhausting memory resources, potentially disrupting access to business-critical applications and services. This could affect availability of web applications, VPNs, and security services such as web application firewalls integrated with BIG-IP. Given the reliance on these devices in sectors like finance, telecommunications, government, and healthcare across Europe, service outages could lead to operational disruptions, financial losses, and reputational damage. The requirement for authentication reduces the risk from external attackers but raises concerns about insider threats or compromised credentials. Additionally, automated management systems using iControl REST could be targeted to trigger resource exhaustion remotely. The absence of known exploits suggests that the threat is currently theoretical, but the medium severity and potential for DoS warrant proactive mitigation.

Mitigation Recommendations

European organizations should prioritize patching affected BIG-IP and BIG-IQ devices with the vendor-released updates that address this vulnerability. Since no patch links are provided in the source, organizations should consult F5’s official security advisories and support channels for the latest firmware and software updates. In the interim, organizations should restrict access to the iControl REST interface to trusted administrators and management networks only, employing network segmentation and firewall rules to limit exposure. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitor system memory usage and iControl REST API logs for unusual spikes or anomalous request patterns that could indicate exploitation attempts. Employ rate limiting or API gateway controls to prevent abuse of the REST interface. Regularly audit user accounts with access to iControl REST and remove unnecessary privileges. Finally, incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd831d

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 5:27:48 AM

Last updated: 7/29/2025, 9:54:44 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats