CVE-2026-40631: F5 iControl SOAP Privilege Escalation

CVE-2026-40631: F5 iControl SOAP Privilege Escalation

The National Vulnerability Database has detailed CVE-2026-40631, a high-severity privilege escalation vulnerability impacting F5 products utilizing iControl SOAP. An authenticated attacker, provided they hold either the Resource Administrator or Administrator role, can exploit this flaw to modify critical configuration objects. This manipulation ultimately leads to escalated privileges within the system.

Rated with a CVSS score of 8.7, this vulnerability presents a significant risk. The attack vector is network-based, requires low attack complexity, and no user interaction. However, it does require high privileges to initiate, meaning an attacker already needs a foothold. Despite this, the impact on confidentiality and integrity is high, making it a critical concern for defenders.

While the National Vulnerability Database did not specify particular affected products, organizations leveraging F5 solutions that integrate iControl SOAP should assume they are at risk. It’s crucial to note that software versions that have reached End of Technical Support (EoTS) are not evaluated, but this does not negate their potential vulnerability. Defenders must prioritize patching and rigorous access control for administrative interfaces.

What This Means For You

  • If your organization uses F5 products with iControl SOAP, you need to understand the implications of CVE-2026-40631. An attacker who gains even a high-level administrative account could use this to further escalate privileges and take full control. Review your administrative access controls immediately, ensure least privilege is enforced for all F5 iControl SOAP users, and prepare to patch as soon as F5 releases a fix.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rule · 6 SIEM formats

1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high vulnerability event-type

Exploitation Attempt — CVE-2026-40631

Sigma YAML — free preview
title: Exploitation Attempt — CVE-2026-40631
id: scw-2026-05-13-evt-1
status: experimental
level: high
description: |
  Monitor for exploitation attempts targeting CVE-2026-40631. Patch immediately if running affected CVE-2026-40631 products.
author: SCW Feed Engine (auto-generated)
date: 2026-05-13
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-40631/
tags:
  - attack.general
  - attack.vulnerability
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
        - 'CVE-2026-40631'
      sc-status:
        - 200
        - 500
      condition: selection
falsepositives:
  - Legitimate activity from CVE-2026-40631

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40631 Privilege Escalation Authenticated attacker with Resource Administrator or Administrator role
CVE-2026-40631 Privilege Escalation Modify configuration objects through iControl SOAP
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 13, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-44577 — Next.js is a React framework for building full-stack web

CVE-2026-44577 — Next.js is a React framework for building full-stack web applications. From 10.0.0 to before 15.5.16 and 16.2.5, when self-hosting Next.js with the default...

vulnerabilityCVEmedium-severitycwe-770
/SCW Vulnerability Desk /MEDIUM /5.9 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-44576 — Next.js is a React framework for building full-stack web

CVE-2026-44576 — Next.js is a React framework for building full-stack web applications. From 14.2.0 to before 15.5.16 and 16.2.5, applications using React Server Components can...

vulnerabilityCVEmedium-severitycwe-436
/SCW Vulnerability Desk /MEDIUM /5.4 /⚑ 2 IOCs /⚙ 3 Sigma

Next.js App Router Flaw Bypasses Middleware Authorization

CVE-2026-44575 — Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on...

vulnerabilityCVEhigh-severitycwe-288
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 4 IOCs /⚙ 3 Sigma