BIG-IP Privilege Escalation: CVE-2026-41953 Allows Resource Admin to Root

BIG-IP Privilege Escalation: CVE-2026-41953 Allows Resource Admin to Root

The National Vulnerability Database has detailed CVE-2026-41953, a high-severity privilege escalation vulnerability impacting BIG-IP systems. This flaw allows a highly privileged, authenticated attacker holding at least the Resource Administrator role to modify critical configuration objects. The result is a direct path to privilege escalation, a dangerous scenario for internal security.

Rated with a CVSS score of 8.7 (HIGH), this vulnerability is concerning because it leverages an existing high-level account. An attacker who has already compromised a Resource Administrator account doesn’t need to find a new exploit path; they can simply chain this vulnerability to gain higher privileges. The National Vulnerability Database specifies the vector as CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N, indicating network accessibility, low attack complexity, and high impact on confidentiality and integrity, with no availability impact.

While specific affected product versions were not detailed by the National Vulnerability Database, organizations running BIG-IP should assume they are at risk until proven otherwise. This is a classic example of CWE-77, where an attacker can inject commands or manipulate existing configurations. The attacker’s calculus here is clear: an insider threat, or an external attacker who has already gained a foothold, now has a straightforward path to deeper system control.

What This Means For You

  • If your organization uses BIG-IP systems, you need to immediately assess your internal access controls and audit logs for any suspicious activity from Resource Administrator accounts. This isn't about patching a zero-day; it's about containing a threat that leverages existing high-level access. Review your BIG-IP configurations and ensure no unauthorized modifications have occurred. Privilege escalation from an authenticated user is a critical red flag.

Indicators of Compromise

IDTypeIndicator
CVE-2026-41953 Privilege Escalation BIG-IP systems
CVE-2026-41953 Privilege Escalation Authenticated attacker with Resource Administrator role
CVE-2026-41953 Privilege Escalation Modification of configuration objects
🔎
Track BIG-IP Vulnerabilities Use /org f5.com to see the latest threats and advisories related to BIG-IP and F5 products.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 13, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-44577 — Next.js is a React framework for building full-stack web

CVE-2026-44577 — Next.js is a React framework for building full-stack web applications. From 10.0.0 to before 15.5.16 and 16.2.5, when self-hosting Next.js with the default...

vulnerabilityCVEmedium-severitycwe-770
/SCW Vulnerability Desk /MEDIUM /5.9 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-44576 — Next.js is a React framework for building full-stack web

CVE-2026-44576 — Next.js is a React framework for building full-stack web applications. From 14.2.0 to before 15.5.16 and 16.2.5, applications using React Server Components can...

vulnerabilityCVEmedium-severitycwe-436
/SCW Vulnerability Desk /MEDIUM /5.4 /⚑ 2 IOCs /⚙ 3 Sigma

Next.js App Router Flaw Bypasses Middleware Authorization

CVE-2026-44575 — Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on...

vulnerabilityCVEhigh-severitycwe-288
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 4 IOCs /⚙ 3 Sigma