<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution in Threats</title>
    <link>https://community.isc2.org/t5/Threats/F5-Issues-Warning-BIG-IP-Vulnerability-Allows-Remote-Code/m-p/63960#M946</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote code execution.&lt;/P&gt;&lt;P&gt;The issue, rooted in the configuration utility component, has been assigned the CVE identifier&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CVE-2023-46747&lt;/STRONG&gt;, and carries a CVSS score of 9.8 out of a maximum of 10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://thehackernews.com/2023/10/f5-issues-warning-big-ip-vulnerability.html" target="_blank" rel="noopener"&gt;https://thehackernews.com/2023/10/f5-issues-warning-big-ip-vulnerability.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://my.f5.com/manage/s/article/K000137353" target="_blank"&gt;BIG-IP Configuration utility unauthenticated remote code execution vulnerability CVE-2023-46747 (f5.com)&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 28 Oct 2023 14:36:09 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2023-10-28T14:36:09Z</dc:date>
    <item>
      <title>F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution</title>
      <link>https://community.isc2.org/t5/Threats/F5-Issues-Warning-BIG-IP-Vulnerability-Allows-Remote-Code/m-p/63960#M946</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote code execution.&lt;/P&gt;&lt;P&gt;The issue, rooted in the configuration utility component, has been assigned the CVE identifier&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CVE-2023-46747&lt;/STRONG&gt;, and carries a CVSS score of 9.8 out of a maximum of 10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://thehackernews.com/2023/10/f5-issues-warning-big-ip-vulnerability.html" target="_blank" rel="noopener"&gt;https://thehackernews.com/2023/10/f5-issues-warning-big-ip-vulnerability.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://my.f5.com/manage/s/article/K000137353" target="_blank"&gt;BIG-IP Configuration utility unauthenticated remote code execution vulnerability CVE-2023-46747 (f5.com)&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Oct 2023 14:36:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/F5-Issues-Warning-BIG-IP-Vulnerability-Allows-Remote-Code/m-p/63960#M946</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2023-10-28T14:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution</title>
      <link>https://community.isc2.org/t5/Threats/F5-Issues-Warning-BIG-IP-Vulnerability-Allows-Remote-Code/m-p/63964#M947</link>
      <description>&lt;P&gt;From the advisory: "&lt;SPAN&gt;this is a control plane issue only.".&amp;nbsp; In other words, it is an attack against the management interface.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;The important reminder for all of us (even those who are not F5 customers) is that management interfaces should only be accessible to those who need to manage the device.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Even the login prompt itself ought to whitelisted from&amp;nbsp;&lt;/SPAN&gt;source-IP addresses where your admins may likely be (office subnet, VPN addreses, etc.).&amp;nbsp; The goal being to prevent an actor from staging an authentication bypass attack against a particularly powerful interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2023 02:49:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/F5-Issues-Warning-BIG-IP-Vulnerability-Allows-Remote-Code/m-p/63964#M947</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2023-10-29T02:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution</title>
      <link>https://community.isc2.org/t5/Threats/F5-Issues-Warning-BIG-IP-Vulnerability-Allows-Remote-Code/m-p/63968#M948</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for sharing your thoughts and&amp;nbsp;comments and suggestions.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2023 04:27:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/F5-Issues-Warning-BIG-IP-Vulnerability-Allows-Remote-Code/m-p/63968#M948</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2023-10-29T04:27:24Z</dc:date>
    </item>
  </channel>
</rss>

