Two vulnerabilities, including one with a Common Vulnerability Scoring System (CVSS) score of 10, have been discovered in the F5 BIG-IP application delivery controller. Both vulnerabilities have now been patched in updates available to BIG-IP customers.
The more serious of the two, CVE-2020-5902, was a remote code execution vulnerability in the Traffic Management User Interface (TMUI). By exploiting this vulnerability, an unauthorized user could create or delete files, disable services, intercept information, run arbitrary system commands and Java code, completely compromise the system, and pursue further targets. Positive Technologies researcher Mikhail Klyuchnikov noted that this vulnerability is especially dangerous for that minority of BIG-IP owners who have exposed the TMUI to the Internet, where it can be discovered by tools such as Shodan.
Both vulnerabilities have been patched in the most recent versions of BIG-IP. Customers are urged to update vulnerable versions immediately.
Read more here.