Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
[ad_1]
A number of safety vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ units that, if efficiently exploited, to utterly compromise affected techniques.
Cybersecurity agency Rapid7 mentioned the flaws may very well be abused to distant entry to the units and defeat safety constraints. The problems affect BIG-IP variations 13.x, 14.x, 15.x, 16.x, and 17.x, and BIG-IQ Centralized Administration variations 7.x and eight.x.
The 2 high-severity points, which had been reported to F5 on August 18, 2022, are as follows –
“By efficiently exploiting the worst of the vulnerabilities (CVE-2022-41622), an attacker might acquire persistent root entry to the system’s administration interface (even when the administration interface will not be internet-facing),” Rapid7 researcher Ron Bowes mentioned.
Nonetheless, it is price noting that such an exploit requires an administrator with an energetic session to go to a hostile web site.
Additionally recognized had been three completely different situations of safety bypass, which F5 mentioned can’t be exploited with out first breaking present safety limitations by means of a beforehand undocumented mechanism.
Ought to such a state of affairs come up, an adversary with Superior Shell (bash) entry to the equipment might weaponize these weaknesses to execute arbitrary system instructions, create or delete recordsdata, or disable companies.
Whereas F5 has made no point out of any of the vulnerabilities being exploited in assaults, it is really helpful that customers apply the required “engineering hotfix” launched by the corporate to mitigate potential dangers.
[ad_2]