Sunday, March 26, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Critical flaw compromises F5 BIG-IP Application Security Servers

Critical flaw compromises F5 BIG-IP Application Security Servers

Security researchers discovered a critical flaw, that can affect F5 BIG-IP those run application security servers which is caused by a remote code execution vulnerability. Researchers informed the company about the flaw.


Seda Nur Cinar Seda Nur Cinar
July 6, 2020
2 min read
Critical flaw compromises F5 BIG-IP Application Security Servers

Mikhail Klyuchnikov, a security researcher from Positive Technology, the company that discovered the vulnerability and reported it to F5 Networks told that the flaw existed in a configuration utility (Traffic management User Interface) which is present inside the BIG-IP Application Delivery Controller. The vulnerability named CVE-2020-5902 is classified as a critical vulnerability. It has a CVSS score of 10 out of 10. This vulnerability could enable remote attackers to gain control of the systems and ultimately commandeering the data streams.

The attack vector for CVE-2020-5902

To exploit this vulnerability an attacker can send a malicious HTTP request to the server which hosts Traffic management User Interface tool that is used to configure the BIG-IP system. After bypassing the security safeguards attackers can gain full access to the compromised server and execute commands without further authentication requirements.
Creating and deleting files, executing Java code, command services, and do virtually anything as well as accessing the internal network after taking control of the BIG-IP system.

ADC XSS Flaw

There is also another vulnerability that has a score of 7.5 out of 10, which is an XSS that allow attackers to run JavaScript code as if they were a logged-in administrator. This flaw is named CVE-2020-5903 and has been addressed as the previous flaw before made into the public.

To mitigate these attacks system administrators are advised to update their software versions if they are running 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, or 15.1.x versions of the software to 1.6.5.2, 12.1.5.2, 13.1.3.4, 14.1.2.6, or 15.1.0.4 versions, respectively. If a virtual Edition of the F% BIG-IP is used, users are also advised to the latest version accordingly through their cloud provider like Azure, AWS, or Alibaba.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
MySQL is also changing terminology

MySQL is also changing terminology

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Weekly round-up: 20-24 March
  • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
  • What is a Daemon in Linux?
  • 7 best practices and tools to use for Linux security
  • Photopea review: The best free Photoshop alternative for Linux

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.