Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Dozen High-Severity Vulnerabilities Patched in F5 Products

Security and application delivery company F5 has released its October 2022 quarterly security notification, informing customers about a total of 18 vulnerabilities affecting its products.

Security and application delivery company F5 has released its October 2022 quarterly security notification, informing customers about a total of 18 vulnerabilities affecting its products.

A dozen of these vulnerabilities were assigned a ‘high severity’ rating. One of them is an authenticated remote code execution vulnerability affecting systems deployed in standard or appliance mode. The issue has a ‘critical’ rating if the device is in appliance mode. An attacker with elevated privileges can exploit the flaw to run arbitrary system commands, create or delete files, or disable services.

A majority of the remaining high-severity vulnerabilities can allow a remote, unauthenticated attacker to launch denial-of-service (DoS) attacks.

In addition, three of the advisories are related to NGINX modules and they describe flaws that can allow a local attacker to cause an NGINX worker process to terminate.

A ‘high severity’ rating has also been assigned to an F5OS vulnerability that can be exploited for privilege escalation.

F5’s next quarterly updates are scheduled for February 1, 2023. The two previous quarterly notifications — released in May and August — informed customers about 50 and 21 vulnerabilities, respectively.

BIG-IP users should not ignore these patches as threat actors have been known to target vulnerabilities affecting the product. The most recent example is CVE-2022-1388, which saw mass exploitation earlier this year, with some hackers leveraging it to destroy BIG-IP appliances.

Related: Iranian Hackers Target Critical Vulnerability in F5’s BIG-IP

Related: F5 Patches Two Dozen Vulnerabilities in BIG-IP

Related: Vulnerability Exposes F5 BIG-IP Systems to Remote DoS Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Vulnerabilities

Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.