Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

CISA Says Hackers Exploited BIG-IP Vulnerability in Attacks on U.S. Government

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert on Friday to warn organizations about the risk posed by a recently patched vulnerability affecting F5 Networks’ BIG-IP application delivery controller (ADC).

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert on Friday to warn organizations about the risk posed by a recently patched vulnerability affecting F5 Networks’ BIG-IP application delivery controller (ADC).

The critical security hole, identified as CVE-2020-5902, allows an attacker with access to the product’s Traffic Management User Interface (TMUI) configuration utility to obtain credentials and other sensitive data, intercept traffic, and execute arbitrary code or commands, resulting in the system getting completely compromised.

The issue was disclosed on July 1. At the time of disclosure, Positive Technologies, whose employees have been credited for reporting the vulnerability to F5, estimated that there had been thousands of vulnerable devices exposed to the internet, including many in the United States.

A proof-of-concept (PoC) exploit was released a few days later and the first exploitation attempts were spotted on July 5. F5, which released a patch before disclosure, tells customers to assume that their systems have been compromised if they’ve failed to install the patch for CVE-2020-5902.

CISA says government departments and agencies have been seeing scanning and reconnaissance activity associated with this flaw since July 6. The agency has been investigating several potential breaches resulting from the exploitation of this vulnerability, including against U.S. government and commercial organizations, and it has so far confirmed two instances where systems have been compromised.

CISA has advised organizations to immediately update their BIG-IP products and if they find evidence of attacks they should swiftly take action.

The agency’s recommendations in case of a breach include reimaging compromised hosts, resetting account passwords, limiting access to the vulnerable management interface, and implementing network segmentation to prevent the attacker from moving laterally within the network.

Related: Vulnerability in Cisco Firewalls Exploited Shortly After Disclosure

Advertisement. Scroll to continue reading.

Related: Hackers Find Way to Bypass Mitigation for Exploited BIG-IP Vulnerability

Related: BIG-IP Vulnerability Exploited to Deliver DDoS Malware

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Madhu Gottumukkala has been named Deputy Director of the cybersecurity agency CISA.

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.