F5 BIG-IP, BIG-IQ CVE-2026-42406: Critical RCE for Privileged Attackers

F5 BIG-IP, BIG-IQ CVE-2026-42406: Critical RCE for Privileged Attackers

The National Vulnerability Database has disclosed CVE-2026-42406, a high-severity vulnerability affecting F5 BIG-IP and BIG-IQ systems. This flaw allows a highly privileged, authenticated attacker with at least the Certificate Manager role to modify configuration objects, leading to arbitrary command execution. The CVSSv3.1 score is 8.7 (HIGH), with a vector of AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N.

This isn’t a zero-day for the masses, but it’s a critical internal threat. The attacker needs existing high-level authentication, meaning this is an escalation path for an insider threat or a post-compromise move for an external actor who’s already breached initial defenses. Gaining arbitrary command execution on these systems is a full compromise of the device, offering a powerful pivot point within the network. This isn’t just about data exfiltration; it’s about network control.

Defenders need to treat this as a serious privilege escalation and RCE risk. While specific affected product versions were not detailed by the National Vulnerability Database, organizations running F5 BIG-IP and BIG-IQ should prioritize reviewing access controls and logging for their Certificate Manager roles. Any suspicious activity from these accounts warrants immediate investigation. End-of-Technical-Support (EoTS) versions are, as always, not evaluated, but also pose their own unpatched risks.

What This Means For You

  • If your organization uses F5 BIG-IP or BIG-IQ, immediately audit all accounts with Certificate Manager roles or higher. Review logs for any unusual configuration changes or command execution attempts originating from these roles. This vulnerability grants arbitrary command execution, making it a critical path for internal compromise or lateral movement.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1219 Execution

CVE-2026-42406 F5 BIG-IP/BIG-IQ Configuration Modification for RCE

Sigma YAML — free preview
title: CVE-2026-42406 F5 BIG-IP/BIG-IQ Configuration Modification for RCE
id: scw-2026-05-13-ai-1
status: experimental
level: critical
description: |
  Detects attempts to modify F5 BIG-IP/BIG-IQ global settings via the management API. This specific URI and method combination, when successful (indicated by a 200 status code), can be exploited by a privileged attacker to inject commands, aligning with CVE-2026-42406.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-42406/
tags:
  - attack.execution
  - attack.t1219
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/mgmt/tm/sys/global-settings'
      cs-method:
          - 'PATCH'
      sc-status:
          - '200'
      cs-uri-query|contains:
          - 'api/tm/sys/global-settings'
  selection_base:
      cs-uri|contains:
          - '/mgmt/tm/sys/global-settings'
  selection_indicators:
      cs-uri-query|contains:
          - 'api/tm/sys/global-settings'
      cs-method:
          - 'PATCH'
      sc-status:
          - '200'
  condition: selection_base AND selection_indicators
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-42406 RCE BIG-IP systems
CVE-2026-42406 RCE BIG-IQ systems
CVE-2026-42406 Privilege Escalation Authenticated attacker with Certificate Manager role can modify configuration objects to run arbitrary commands.
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 13, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-44577 — Next.js is a React framework for building full-stack web

CVE-2026-44577 — Next.js is a React framework for building full-stack web applications. From 10.0.0 to before 15.5.16 and 16.2.5, when self-hosting Next.js with the default...

vulnerabilityCVEmedium-severitycwe-770
/SCW Vulnerability Desk /MEDIUM /5.9 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-44576 — Next.js is a React framework for building full-stack web

CVE-2026-44576 — Next.js is a React framework for building full-stack web applications. From 14.2.0 to before 15.5.16 and 16.2.5, applications using React Server Components can...

vulnerabilityCVEmedium-severitycwe-436
/SCW Vulnerability Desk /MEDIUM /5.4 /⚑ 2 IOCs /⚙ 3 Sigma

Next.js App Router Flaw Bypasses Middleware Authorization

CVE-2026-44575 — Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on...

vulnerabilityCVEhigh-severitycwe-288
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 4 IOCs /⚙ 3 Sigma