Hackers Start Exploiting Recently Patched BIG-IP Vulnerability

Hackers have already started exploiting a recently patched vulnerability affecting F5 Networks’ BIG-IP application delivery controller (ADC).


F5 informed customers last week that a BIG-IP configuration utility named Traffic Management User Interface (TMUI) is impacted by a critical remote code execution vulnerability whose exploitation can result in “complete system compromise.”


The flaw is tracked as CVE-2020-5902 and it was reported to F5 by cybersecurity firm Positive Technologies. The vendor has released patches for impacted versions.


“By exploiting this vulnerability, a remote attacker with access to the BIG-IP configuration utility could, without authorization, perform remote code execution,” explained Mikhail Klyuchnikov, a researcher at Positive Technologies. “The attacker can create or delete files, disable services, intercept information, run arbitrary system commands and Java code, completely compromise the system, and pursue further targets, such as the internal network. RCE in this case results from security flaws in multiple components, such as one that allows directory traversal exploitation.”


Positive Technologies noted that it had identified over 8,000 vulnerable devices that were directly exposed to the internet, but said that most companies did not leave the impacted configuration interface accessible from the web.


Just days after the disclosure of CVE-2020-5902, researchers started releasing proof-of-concept (PoC) exploits for arbitrary file read and remote code execution. Others released scanners that check if a specified BIG-IP installation is vulnerable to attacks and there is even a hackers start exploiting recently patched vulnerability