Security and application delivery company F5 has released its October 2022 quarterly security notification, informing customers about a total of 18 vulnerabilities affecting its products.
A dozen of these vulnerabilities were assigned a ‘high severity’ rating. One of them is an authenticated remote code execution vulnerability affecting systems deployed in standard or appliance mode. The issue has a ‘critical’ rating if the device is in appliance mode. An attacker with elevated privileges can exploit the flaw to run arbitrary system commands, create or delete files, or disable services.
A majority of the remaining high-severity vulnerabilities can allow a remote, unauthenticated attacker to launch denial-of-service (DoS) attacks.
In addition, three of the advisories are related to NGINX modules and they describe flaws that can allow a local attacker to cause an NGINX worker process to terminate.
A ‘high severity’ rating has also been assigned to an F5OS vulnerability that can be exploited for privilege escalation.
F5’s next quarterly updates are scheduled for February 1, 2023. The two previous quarterly notifications — released in May and August — informed customers about 50 and 21 vulnerabilities, respectively.
BIG-IP users should not ignore these patches as threat actors have been known to target vulnerabilities affecting the product. The most recent example is CVE-2022-1388, which saw mass exploitation earlier this year, with some hackers leveraging it to destroy BIG-IP appliances.
Related: Iranian Hackers Target Critical Vulnerability in F5’s BIG-IP
Related: F5 Patches Two Dozen Vulnerabilities in BIG-IP
Related: Vulnerability Exposes F5 BIG-IP Systems to Remote DoS Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
Latest News
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
