• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services

Critical RCE Flaw (CVSS 10) Influences F5 Massive-IP Application Security Servers

You are here: Home / General Cyber Security News / Critical RCE Flaw (CVSS 10) Influences F5 Massive-IP Application Security Servers
July 4, 2020

Cybersecurity scientists currently issued a safety advisory warning enterprises and governments throughout the globe to quickly patch a really-significant distant code execution vulnerability affecting F5’s Large-IP networking equipment jogging software security servers.
The vulnerability, assigned CVE-2020-5902 and rated as essential with a CVSS score of 10 out of 10, could allow distant attackers acquire complete regulate of the qualified methods, finally gaining surveillance about the application facts they control.
In accordance to Mikhail Klyuchnikov, a safety researcher at Constructive Technologies who identified the flaw and described it to F5 Networks, the challenge resides in a configuration utility known as Site visitors Administration User Interface (TMUI) for Large-IP software supply controller (ADC).
Major-IP ADC is being employed by substantial enterprises, details facilities, and cloud computing environments, allowing them to carry out application acceleration, load balancing, fee shaping, SSL offloading, and website application firewall.

F5 Major-IP ADC RCE Flaw (CVE-2020-5902)

An unauthenticated attacker can remotely exploit this vulnerability by sending a maliciously crafted HTTP ask for to the vulnerable server internet hosting the Targeted traffic Management Person Interface (TMUI) utility for Big-IP configuration.
Thriving exploitation of this vulnerability could enable attackers to acquire full admin handle in excess of the device, finally making them do any task they want on the compromised device without the need of any authorization.
f5 big-ip application security manager

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“The attacker can make or delete data files, disable companies, intercept facts, run arbitrary method commands and Java code, completely compromise the process, and go after even more targets, this kind of as the inner community,” Klyuchnikov mentioned.
“RCE in this scenario success from safety flaws in numerous components, these kinds of as one that enables listing traversal exploitation.”
As of June 2020, much more than 8,000 units have been recognized online as currently being uncovered immediately to the web, of which 40% reside in the United States, 16% in China, 3% in Taiwan, 2.5% in Canada and Indonesia and much less than 1% in Russia, the security company claims.
Even so, Klyuchnikov also states that most businesses making use of the influenced item do not enable entry to the internet’s susceptible configuration interface.

F5 Major-IP ADC XSS Flaw (CVE-2020-5903)

Moreover this, Klyuchnikov also reported an XSS vulnerability (assigned CVE-2020-5903 with a CVSS rating of 7.5) in the Significant-IP configuration interface that could allow distant attackers operate malicious JavaScript code as the logged-in administrator consumer.
“If the user has administrator privileges and obtain to Innovative Shell (bash), productive exploitation can lead to a full compromise of Large-IP by means of RCE,” the researcher mentioned.

Afflicted Variations and Patch Updates

Affected businesses and directors relying on vulnerable Major-IP versions 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15..x, 15.1.x are strongly proposed to update their equipment to the hottest variations 11.6.5.2, 12.1.5.2, 13.1.3.4, 14.1.2.6, 15.1..4 as quickly as probable.
Also, customers of community cloud marketplaces like AWS (Amazon World wide web Companies), Azure, GCP, and Alibaba are also recommended to change to Large-IP Virtual Edition (VE) versions 11.6.5.2, 12.1.5.2, 13.1.3.4, 14.1.2.6, 15..1.4, or 15.1..4, as soon as they are accessible.
Identified this article appealing? Adhere to THN on Facebook, Twitter  and LinkedIn to read through a lot more exceptional written content we write-up.

Previous Post: « Law enforcement Arrested Hundreds of Criminals Right after Hacking Into Encrypted Chat Community
Next Post: Cato MDR: Managed Threat Detection and Response Created Simple »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.