Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22549: CWE-250: Execution with Unnecessary Privileges in F5 F5 BIG-IP Container Ingress Services

0
Medium
VulnerabilityCVE-2026-22549cvecve-2026-22549cwe-250
Published: Wed Feb 04 2026 (02/04/2026, 15:15:36 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: F5 BIG-IP Container Ingress Services

Description

A vulnerability exists in F5 BIG-IP Container Ingress Services that may allow excessive permissions to read cluster secrets.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 02/04/2026, 15:44:33 UTC

Technical Analysis

CVE-2026-22549 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting F5 BIG-IP Container Ingress Services versions 1.0.0 and 2.0.0. This vulnerability arises because the service grants excessive permissions that allow it to read cluster secrets beyond what is necessary for its operation. Cluster secrets typically contain sensitive information such as credentials, tokens, or keys used within container orchestration platforms like Kubernetes. The vulnerability does not require user interaction but does require the attacker to have high privileges (PR:H) on the network (AV:N), indicating that exploitation is possible remotely but only by users or processes with elevated privileges. The CVSS v3.1 base score is 4.9 (medium severity), reflecting the high confidentiality impact (C:H) but no impact on integrity (I:N) or availability (A:N). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other components. No known exploits are currently reported in the wild, and no patches have been published at the time of this report. The vulnerability is particularly concerning in containerized environments where secrets management is critical to maintaining security boundaries. If exploited, an attacker with elevated privileges could read sensitive cluster secrets, potentially enabling further attacks such as privilege escalation, lateral movement, or data exfiltration within the container orchestration environment. The vulnerability affects supported versions only; versions that have reached End of Technical Support (EoTS) are not evaluated. Organizations using F5 BIG-IP Container Ingress Services should assess their exposure and prepare to apply vendor patches once available.

Potential Impact

For European organizations, the primary impact of CVE-2026-22549 is the potential exposure of sensitive cluster secrets within container orchestration environments. This can lead to unauthorized access to critical infrastructure components, enabling attackers to move laterally, escalate privileges, or exfiltrate sensitive data. Given the widespread adoption of containerized applications and Kubernetes in Europe, especially in sectors such as finance, telecommunications, and government, this vulnerability poses a significant risk to confidentiality. The absence of integrity or availability impacts limits the scope to data confidentiality breaches, but the sensitivity of secrets involved can have cascading effects on overall security posture. Organizations relying on F5 BIG-IP Container Ingress Services for ingress management in containerized environments may face increased risk if attackers gain elevated privileges or if insider threats exploit this vulnerability. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Failure to address this vulnerability could result in regulatory non-compliance, particularly under GDPR, if sensitive data is compromised. Therefore, European organizations must prioritize detection, containment, and remediation efforts to mitigate potential impacts.

Mitigation Recommendations

1. Limit privileges: Ensure that F5 BIG-IP Container Ingress Services run with the minimum necessary privileges, adhering to the principle of least privilege to reduce the risk of excessive permission exploitation. 2. Secrets management: Implement strict access controls and auditing on cluster secrets, using Kubernetes RBAC policies and secrets encryption to limit exposure. 3. Network segmentation: Isolate container ingress services within secure network zones to restrict access to trusted entities only. 4. Monitoring and alerting: Deploy continuous monitoring solutions to detect unusual access patterns or privilege escalations related to ingress services and secrets access. 5. Vendor updates: Monitor F5 advisories closely and apply patches or updates promptly once they become available to remediate the vulnerability. 6. Incident response readiness: Prepare and test incident response plans specific to container orchestration environments to quickly address potential exploitation. 7. Configuration review: Regularly audit the configuration of F5 BIG-IP Container Ingress Services and Kubernetes clusters to identify and remediate misconfigurations that could exacerbate the vulnerability. 8. Use of alternative ingress controllers: Where feasible, consider alternative ingress solutions with a smaller attack surface or better privilege management until patches are available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
f5
Date Reserved
2026-01-21T21:33:16.368Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69836601f9fa50a62f96098c

Added to database: 2/4/2026, 3:30:09 PM

Last enriched: 2/4/2026, 3:44:33 PM

Last updated: 2/7/2026, 2:22:49 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats