Thursday, August 6, 07:21
Home security PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after release updates for the critical vulnerability in F5 ΒIG-IP devices, security researchers began publishing proof-of-concept (PoC) exploits that show how easily these devices can be compromised through its exploitation vulnerability.

PoC exploits released for critical vulnerability on F5 BIG-IP devices

F5 customers who use BIG-IP devices and solutions are mostly governments, Fortune 500 companies, banks, Internet service providers and many large companies, such as Microsoft, Oracle and Facebook.

On Friday, the F5 revealed that updates had been released critical vulnerability CVE-2020-5902, which was rated 10/10 on the CVSSv3 scale.

This vulnerability allows a remote invader to access the Traffic Management User Interface (TMUI) of BIG-IP application delivery controller (ADC), without identity check. Then the attacker can execute code remotely.

PoC exploits released for critical vulnerability on F5 BIG-IP devices
PoC exploits released for critical vulnerability on F5 BIG-IP devices

Taking advantage of a BIG-IP device could allow an intruder to acquire it full access to the system, to export credentials user and possibly "cross" the internal network of the device.

The attacker can execute various commands, such as creating or deleting files, disabling services and / or executing Java code.

"This vulnerability could lead to a complete breach of the system. The BIG-IP system in Appliance fashion it is also vulnerable. "

Due to the seriousness of this vulnerability, the US government issued a warning and advised users to install the update as quickly as possible.

Traffic F5 BIG-IP PoC exploits

After the patch, many researchers began to publish PoC exploits for the vulnerability F5 BIG-IP CVE-2020-5902 to show how easily one can steal data and execute commands on vulnerable devices.

PoC exploits released for critical vulnerability on F5 BIG-IP devices

Another researcher has created one GitHub repositories which includes PoCs to perform various tasks, such as displaying the / etc / passwd file to gain access to stored credentials or to view the device's configuration file.

Ο Rich warren from NCC Group has already seen remote attacks attempting to exploit vulnerable F5 BIG-IP devices.

PoC exploits released for critical vulnerability on F5 BIG-IP devices
PoC exploits released for critical vulnerability on F5 BIG-IP devices

If you use F5 BIG-IP devices on your network, you must notify them immediately.

BIG-IP versions that are vulnerable to attacks (11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x) must be upgraded to the corresponding updated versions (11.6.5.2, 12.1.5.2 , 13.1 .3.4, 14.1.2.6, 15.1.0.4).

Without a doubt, the APT teams, that is, the hacking teams funded by governments, but also ransomware gangs they will try to use these vulnerabilities to break into your network. Update your systems now!

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortresshttps://www.secnews.gr
Pursue Your Dreams & Live!

LIVE NEWS

Why the Edge crashed with Google's default search engine

An explanation has been given by Microsoft, regarding the error that caused the collapse of the Edge, when Google was set ...

Waymo: 18 months in prison for the employee who stole the data!

Anthony Levandowski, former chief engineer of Waymo, was sentenced to 18 months in prison for stealing confidential data from Google.
00:02:16

Call of Duty Warzone: The game's hackers have grown exponentially

While cheats are a long-standing problem for Call of Duty: Warzone, they seem to be commonplace in the game.

SEE LIVE NOW: Presentation of the Samsung Galaxy Note 20 5G

Watch live now on YouTube the presentation of Samsung's new product, the Galaxy Note 20 5G. SEE ...

Remote Work means more hours and meetings

The massive shift to remote work since the pandemic began brought several upheavals: more flexibility, no routes, comfortable clothes.

Microsoft spent nearly $ 14 million on Bug Bounty

In a statement on Tuesday, Microsoft said it had spent about $ 13,7 million on bug bounty programs ...

More than 50 vulnerabilities are fixed on Android

On Monday, Google released security updates for August 2020. The updates concern the Android operating system, with code updates ...

Kodak: Under investigation for $ 765 million loan?

Trading on the Kodak Stock Exchange rose shortly before the announcement of the $ 765 million loan for the production of drugs.

DNS-over-HTTPS (DoH) Protocol: The new "weapon" of Iranian APT hackers!

The Iranian APT hackers of the group known as "Oilrig", are the first to integrate the DNS-over-HTTPS (DoH) protocol in ...

NSA: Warns about the dangers of location services

The US National Security Agency, NSA, warns about mobile location services and the dangers to national security and ...