Security and application delivery company F5 has released its October 2022 quarterly security notification, informing customers about a total of 18 vulnerabilities affecting its products.
A dozen of these vulnerabilities were assigned a ‘high severity’ rating. One of them is an authenticated remote code execution vulnerability affecting systems deployed in standard or appliance mode. The issue has a ‘critical’ rating if the device is in appliance mode. An attacker with elevated privileges can exploit the flaw to run arbitrary system commands, create or delete files, or disable services.
A majority of the remaining high-severity vulnerabilities can allow a remote, unauthenticated attacker to launch denial-of-service (DoS) attacks.
In addition, three of the advisories are related to NGINX modules and they describe flaws that can allow a local attacker to cause an NGINX worker process to terminate.
A ‘high severity’ rating has also been assigned to an F5OS vulnerability that can be exploited for privilege escalation.
F5’s next quarterly updates are scheduled for February 1, 2023. The two previous quarterly notifications — released in May and August — informed customers about 50 and 21 vulnerabilities, respectively.
BIG-IP users should not ignore these patches as threat actors have been known to target vulnerabilities affecting the product. The most recent example is CVE-2022-1388, which saw mass exploitation earlier this year, with some hackers leveraging it to destroy BIG-IP appliances.
Related: Iranian Hackers Target Critical Vulnerability in F5’s BIG-IP
Related: F5 Patches Two Dozen Vulnerabilities in BIG-IP
Related: Vulnerability Exposes F5 BIG-IP Systems to Remote DoS Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery
Latest News
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
