Newsletter
REAL HACKER NEWS
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO
No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO
No Result
View All Result
REAL HACKER NEWS
No Result
View All Result
Home APPLICATIONS

High Severity Vulnerabilities Reported in F5 BIG-IP and BIG-IQ Devices

Real Hacker Staff by Real Hacker Staff
November 20, 2022
in APPLICATIONS
0
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Related articles

Why can’t I use my iPhone as a webcam on my Apple TV?

Why can’t I use my iPhone as a webcam on my Apple TV?

April 1, 2023
Happy Birthday Apple – these are iMore’s favorite products of all time

Happy Birthday Apple – these are iMore’s favorite products of all time

April 1, 2023


A number of safety vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ units that, if efficiently exploited, to utterly compromise affected methods.

Cybersecurity agency Rapid7 stated the failings could possibly be abused to distant entry to the units and defeat safety constraints. The problems impression BIG-IP variations 13.x, 14.x, 15.x, 16.x, and 17.x, and BIG-IQ Centralized Administration variations 7.x and eight.x.

The 2 high-severity points, which had been reported to F5 on August 18, 2022, are as follows –

  • CVE-2022-41622 (CVSS rating: 8.8) – A cross-site request forgery (CSRF) vulnerability by iControl SOAP, resulting in unauthenticated distant code execution.
  • CVE-2022-41800 (CVSS rating: 8.7) – An iControl REST vulnerability that might enable an authenticated person with an Administrator position to bypass Equipment mode restrictions.

“By efficiently exploiting the worst of the vulnerabilities (CVE-2022-41622), an attacker might achieve persistent root entry to the machine’s administration interface (even when the administration interface will not be internet-facing),” Rapid7 researcher Ron Bowes stated.

Nevertheless, it is price noting that such an exploit requires an administrator with an energetic session to go to a hostile web site.

Additionally recognized had been three completely different situations of safety bypass, which F5 stated can’t be exploited with out first breaking present safety limitations by a beforehand undocumented mechanism.

Ought to such a situation come up, an adversary with Superior Shell (bash) entry to the equipment might weaponize these weaknesses to execute arbitrary system instructions, create or delete information, or disable providers.

Whereas F5 has made no point out of any of the vulnerabilities being exploited in assaults, it is beneficial that customers apply the mandatory “engineering hotfix” launched by the corporate to mitigate potential dangers.





Source link

Tags: BIGIPBIGIQdevicesHighReportedSeverityVulnerabilities
Share76Tweet47

Related Posts

Why can’t I use my iPhone as a webcam on my Apple TV?

Why can’t I use my iPhone as a webcam on my Apple TV?

by Real Hacker Staff
April 1, 2023
0

OK, so hear me out. Wouldn't it be pretty cool if you could use your iPhone as a webcam for...

Happy Birthday Apple – these are iMore’s favorite products of all time

Happy Birthday Apple – these are iMore’s favorite products of all time

by Real Hacker Staff
April 1, 2023
0

Today, on April 1, back in 1976, Apple was founded by Steve Jobs and Steve Wozniak, which eventually led to...

Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps

Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps

by Real Hacker Staff
April 1, 2023
0

î ‚Apr 01, 2023î „Ravie LakshmananAzure / Active Directory Microsoft has patched a misconfiguration issue impacting the Azure Active Directory (AAD) identity...

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation

by Real Hacker Staff
April 1, 2023
0

î ‚Apr 01, 2023î „Ravie LakshmananCyber Attack / Vulnerability Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited...

Millions of Sites at Risk!

Millions of Sites at Risk!

by Real Hacker Staff
April 1, 2023
0

î ‚Apr 01, 2023î „Ravie LakshmananWeb Security / Cyber Threat Unknown threat actors are actively exploiting a recently patched security vulnerability in...

Load More
  • Trending
  • Comments
  • Latest

eSIMs Will Transform the Way You Think About Mobile Data and Security

March 7, 2023

XMOS Launches XVF3800 High-Performance Voice Processor for Enterprise and Consumer Voice Conferencing Platforms

March 7, 2023

Sennheiser Starts Shipping EW-DX Digital Wireless Microphone Series

November 22, 2022

Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European Entities

December 7, 2022

Hello world!

0
US Commodities Regulator Beefs Up Bitcoin Futures Review

US Commodities Regulator Beefs Up Bitcoin Futures Review

0
Bitcoin Hits 2018 Low as Concerns Mount on Regulation, Viability

Bitcoin Hits 2018 Low as Concerns Mount on Regulation, Viability

0
India: Bitcoin Prices Drop As Media Misinterprets Gov’s Regulation Speech

India: Bitcoin Prices Drop As Media Misinterprets Gov’s Regulation Speech

0
It’s April Fools’ Day, Here Are The Best Gaming Gags We’ve Seen

It’s April Fools’ Day, Here Are The Best Gaming Gags We’ve Seen

April 1, 2023
Save up to 35 percent on Logitech’s G PRO X Gaming Headset and more

Save up to 35 percent on Logitech’s G PRO X Gaming Headset and more

April 1, 2023
Always be prompting | TechCrunch

Always be prompting | TechCrunch

April 1, 2023
Pixel Buds Pro’s head tracked Spatial Audio: A wonderful, useless tech

Pixel Buds Pro’s head tracked Spatial Audio: A wonderful, useless tech

April 1, 2023

Recent News

It’s April Fools’ Day, Here Are The Best Gaming Gags We’ve Seen

It’s April Fools’ Day, Here Are The Best Gaming Gags We’ve Seen

April 1, 2023
Save up to 35 percent on Logitech’s G PRO X Gaming Headset and more

Save up to 35 percent on Logitech’s G PRO X Gaming Headset and more

April 1, 2023

Categories

  • APPLICATIONS
  • AUDIO
  • CAMERA
  • COMPUTERS
  • GAMING
  • LAPTOP
  • REVIEWS
  • SECURITY
  • SMARTPHONES
  • Uncategorized
REAL HACKER NEWS

We bring you the best news on Internet new gadgets hacking and technology from around the world

  • Contact
  • Cookie Privacy Policy
  • Terms and Conditions
  • Privacy Policy
  • Disclaimer
  • DMCA

© 2003 Real Hacker News

No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO

© 2003 Real Hacker News

Go to mobile version