Messages – AU – F5, CISA Warning of critical BIG-IP and BIG-IQ-RCE errors

0
1

The administrator of your personal information is Threatpost, Inc, 500 Unicorn Park, Woburn, MA 01801 You can find detailed information on the processing of personal data in the privacy policy. You can also find it in the message confirming the subscription to the newsletter

The administrator of your personal information is Threatpost, Inc, 500 Unicorn Park, Woburn, MA 01801 You can find detailed information on the processing of personal data in the privacy policy. You can also find it in the message confirming the subscription to the newsletter

The F5 errors can affect the network infrastructure of some of the largest technology and Fortune 500 companies – including Microsoft, Oracle, and Facebook

F5 Networks warns users to fix four critical Remote Command Execution (RCE) errors in its BIG-IP and BIG-IQ corporate network infrastructure. If exploited, the errors could allow attackers to take full control of a vulnerable system

The company published a recommendation on Wednesday for a total of seven bugs, with two more classified as high risk and one as medium risk. “We strongly recommend all customers to get their BIG-IP and BIG-IQ systems as soon as possible to upgrade to a fixed version, ”advised the company on its website

The scenario is particularly urgent as F5 provides corporate networks to some of the largest tech companies in the world, including Facebook, Microsoft, and Oracle, as well as a host of Fortune 500 companies, including some of the largest financial institutions in the world, and ISPs

The US. The Cybersecurity and Infrastructure Agency (CISA) also urged companies using BIG-IP and BIG-IQ to address two of the critical vulnerabilities tracked as CVE-2021-22986 and CVE-2021-22987

The former, with a CVSS rating of 98, is an unauthenticated remote command execution vulnerability in the iControl REST interface This is evident from a detailed breakdown of the errors in the F5 Knowledge Center, the latter with a CVSS rating of 99, affects the infrastructure’s Traffic Management User Interface (TMUI), also known as the configuration utility in Fiance mode, the TMUI as per F5, an authenticated RCE vulnerability on undisclosed pages on

The other two critically assessed vulnerabilities are tracked as CVE-2021-22991 and CVE-2021-22992. The first, with a CVSS score of 90, is a buffer overflow vulnerability that can be triggered when “Undisclosed requests are submitted a virtual server may be treated incorrectly by the URM normalization of the Traffic Management Microkernel (TMM) “(F5) This can lead to a DoS attack (Denial-of-Service), which in some situations” theoretically allows bypassing the URL based access control or remote code execution (RCE), ”the company warned

CVE-2021-22992 is also a buffer overflow error with a CVSS rating of 9 According to F5, this error can be caused by “A malicious HTTP response to an advanced WAF / BIG-IP ASM virtual server with a login page configured in the policy In some situations, RCE and “complete system compromises” can also occur, the company warned

The other three non-critical bugs fixed in this week’s F5 update are CVE-2021-22988, CVE-2021-22989, and CVE-2021-22990

CVE-2021-22988 with a CVSS score of 88 is an authenticated RCE that also affects TMUI CVE-2021-22989 with a CVSS score of 80 is another authenticated RCE that also affects the TMUI Appliance mode, this time when Advanced WAF or BIG-IP ASM are deployed And CVE-2021-2290 with a CVSS score of 66 is a similar but less dangerous vulnerability that F5 says exists in the same scenario

Q5 is no stranger to critical bugs in its corporate network products In July, the vendor and other security experts – including US. Cyber ​​Command – urged companies to provide an urgent patch for a critical RCE vulnerability in BIG-IP’s App Delivery Controllers that has been actively exploited by attackers to remove credentials, launch malware, and more. This bug ( CVE-2020-5902) had a CVSS rating of 10 out of 10 due to a delay in patching at this point, the systems were exposed to the bug for weeks after F5 released the update

Check out our free upcoming live webinars – unique, dynamic discussions with cybersecurity experts and the Threatpost community:

At least 10 nation-state supported groups are using the ProxyLogon exploit chain to compromise email servers as the tradeoffs increase

The remote code execution error could allow attackers to deploy malware, change network configurations, and view databases

Malicious e-mails with attachments that deliver the # NanoCore-RAT bypass anti-malware and e-mail scanners through misuse … https: // tco / wqoWf989Zn

Infosec Insider content is authored by a trusted community of Threatpost cybersecurity experts Each post aims to give a unique voice to key cybersecurity topics The content strives to be of the highest quality, objective and non-commercial

Sponsored content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community.This content offers a sponsor the opportunity to send insights and comments from their point of view directly to the Threatpost audience involved in writing or editing sponsored content

F5, Computer Security, Vulnerability, Arbitrary Code Execution

News – AU – F5, CISA Warning of Critical BIG-IP and BIG-IQ-RCE Errors

Source: https://threatpost.com/f5-cisa-critical-rce-bugs/164679/