Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46748: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in F5 BIG-IP

0
High
VulnerabilityCVE-2023-46748cvecve-2023-46748cwe-89
Published: Thu Oct 26 2023 (10/26/2023, 20:05:04 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which may allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

AI-Powered Analysis

AILast updated: 10/21/2025, 20:05:10 UTC

Technical Analysis

CVE-2023-46748 is an authenticated SQL injection vulnerability identified in the F5 BIG-IP Configuration utility, spanning versions 13.1.0 through 17.1.0. This vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), allowing an attacker with valid credentials and network access to the management interface or self IP addresses to inject malicious SQL queries. Successful exploitation can lead to arbitrary system command execution on the BIG-IP device, effectively compromising the underlying system. The attack vector requires low attack complexity and no user interaction, but does require privileges (authenticated access). The vulnerability impacts confidentiality, integrity, and availability, as attackers can manipulate configurations, extract sensitive data, or disrupt services. While no public exploits are currently reported, the high CVSS score of 8.8 reflects the severity and potential impact. The vulnerability does not affect versions beyond those listed or those that have reached End of Technical Support. The BIG-IP platform is widely used for application delivery and security, making this vulnerability critical for organizations relying on it for network traffic management and security enforcement.

Potential Impact

For European organizations, the impact of CVE-2023-46748 is substantial. Compromise of BIG-IP devices can lead to unauthorized access to sensitive network configurations, interception or manipulation of network traffic, and disruption of critical services. This is particularly concerning for sectors such as finance, telecommunications, healthcare, and government, where BIG-IP devices are commonly deployed for load balancing and security. The ability to execute arbitrary system commands could allow attackers to pivot within networks, escalate privileges, or deploy ransomware and other malware. Given the centralized role of BIG-IP in managing traffic, exploitation could result in widespread service outages or data breaches affecting European customers and partners. The vulnerability's requirement for authenticated access somewhat limits exposure but does not eliminate risk, especially in environments where credential compromise or insider threats are possible. The lack of known exploits currently provides a window for mitigation, but the high severity demands urgent attention.

Mitigation Recommendations

1. Apply official patches from F5 as soon as they are released to address CVE-2023-46748. Monitor F5 advisories closely for updates. 2. Restrict network access to the BIG-IP management interface and self IP addresses using network segmentation, firewalls, and access control lists to limit exposure to trusted administrators only. 3. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all users accessing the BIG-IP Configuration utility. 4. Regularly audit and monitor BIG-IP logs for unusual or unauthorized activities indicative of exploitation attempts. 5. Implement strict credential management policies to prevent credential theft or misuse, including regular password changes and least privilege principles. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect SQL injection attempts targeting BIG-IP devices. 7. Conduct security awareness training for administrators managing BIG-IP devices to recognize and respond to suspicious activities promptly. 8. If patching is delayed, consider temporary mitigation such as disabling remote management access or using VPNs with strict access controls to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2023-10-25T18:51:34.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9ae247d717aace25e03

Added to database: 10/21/2025, 7:06:22 PM

Last enriched: 10/21/2025, 8:05:10 PM

Last updated: 10/30/2025, 3:18:21 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats