Security News > 2022 > May > F5 Warns of a New Critical BIG-IP Remote Code Execution Vulnerability
Cloud security and application delivery network provider F5 on Wednesday released patches to contain 43 bugs spanning its products.
"This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services," F5 said in an advisory.
Block iControl REST access through the self IP address.
Block iControl REST access through the management interface.
With F5 appliances widely deployed in enterprise networks, it's imperative that organizations move quickly to apply the patches to prevent threat actors from exploiting the attack vector for initial access.
The security fixes come as the U.S. Cybersecurity and Infrastructure Security Agency added five new flaws to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation -.
News URL
https://thehackernews.com/2022/05/f5-warns-of-new-critical-big-ip-remote.html
Related news
- Patch up – 4 critical bugs in ArubaOS lead to remote code execution (source)
- Critical FortiClient EMS vulnerability fixed, (fake?) PoC for sale (CVE-2023-48788) (source)
- Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool (source)
- PoC exploit for critical Fortra FileCatalyst MFT vulnerability released (CVE-2024-25153) (source)
- Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability (source)
- Critical Unpatched Ray AI Platform Vulnerability Exploited for Cryptocurrency Mining (source)
- Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution (source)
- Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks (source)
- Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability (source)
- A critical vulnerability in Delinea Secret Server allows auth bypass, admin access (source)