Your review has been sent successfully

F5 Networks Alert

2979
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

24 September, 2020

● High

2020-1828

All

Description:

F5 Networks has released an alert to address a vulnerability in the following products:

  • BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
    • 16.0.0
    • 15.1.0
    • 14.1.0 - 14.1.2
    • 13.1.0 - 13.1.3
    • 12.1.0 - 12.1.5
    • 11.6.1 - 11.6.5
  • BIG-IQ Centralized Management
    • 7.0.0 - 7.1.0
    • 6.0.0 - 6.1.0
    • 5.4.0
  • Traffix SDC
    • 5.1.0

* Vulnerability in SCP (a component of OpenSSH).

Threats:

Attacker could exploit this vulnerability by executing arbitrary commands.

Best practice and Recommendations:

F5 Networks recommends doing the following:

  • Restrict SCP access to the BIG-IP Configuration utility to only trusted administrators through local or network firewalls.
  • block SCP access by changing the Port Lockdown setting to Allow None for each self IP in the system.
  • If you must open any ports, you should use the Allow Custom option, taking care to disallow SSH access.

For more information:

Last updated at 24 September, 2020

Rate the content

rate-icon
up icon