F5 BIG-IP/BIG-IQ CVE-2026-32643: High-Privilege RCE
The National Vulnerability Database has detailed CVE-2026-32643, a high-severity vulnerability affecting F5 BIG-IP and BIG-IQ systems. This flaw allows a highly privileged, authenticated attacker holding at least the Certificate Manager role to modify specific configuration objects. The critical impact is the ability to execute arbitrary commands on the underlying system.
This isn’t a zero-day for unauthenticated attackers, but it’s a critical path for an insider threat or an attacker who has already achieved initial access and privilege escalation within the network. Gaining a Certificate Manager role on a BIG-IP or BIG-IQ system typically means an attacker has already bypassed significant controls. With this vulnerability, they can pivot from a high-privilege but constrained role to full system compromise.
The CVSSv3.1 score of 8.7 (HIGH) reflects the significant impact on confidentiality and integrity, with no availability impact. The attack vector is Network, with low attack complexity, requiring high privileges and no user interaction. This highlights the danger of lateral movement once an attacker is inside and has secured privileged credentials.
What This Means For You
- If your organization uses F5 BIG-IP or BIG-IQ, you need to understand the implications of CVE-2026-32643. This vulnerability enables a high-privilege insider or post-compromise attacker to achieve arbitrary code execution. Review and enforce strict role-based access controls for your F5 systems, especially for roles like Certificate Manager. Ensure logging is robust for configuration changes and command execution attempts. Patching is paramount, but also consider the blast radius if an attacker gains high-level access to these critical network devices.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Unauthorized Remote Access Tool Detection
title: Unauthorized Remote Access Tool Detection
id: scw-2026-05-13-1
status: experimental
level: medium
description: |
Detects execution of remote access tools commonly abused by threat actors for persistent access.
author: SCW Feed Engine (auto-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-32643/
tags:
- attack.command_and_control
- attack.t1219
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\AnyDesk.exe'
- '\TeamViewer.exe'
- '\ScreenConnect.exe'
- '\RemoteUtilities.exe'
- '\RustDesk.exe'
condition: selection
falsepositives:
- Legitimate activity from CVE-2026-32643
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-32643 | RCE | BIG-IP systems |
| CVE-2026-32643 | RCE | BIG-IQ systems |
| CVE-2026-32643 | Privilege Escalation | Authenticated attacker with Certificate Manager role can modify configuration objects to run arbitrary commands. |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 13, 2026 at 19:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.