Whether you use F5 products or not, CVE-2020-5902 is still an important vulnerability to understand because you certainly use other products that share the same vulnerable components as the F5 BIG-IP products. There are a ton of lessons to be learned from this exploit that can be applied broadly. One lesson in particular is that we really should assume that all products we use harbor the same secure coding violations that underly CVE-2020-5902 and take pre-emptive action to limit risk.
In this webinar, our own Director of Cyber Threat Research, Kev Breen, joins the experts at Ultimate Windows Security and Randori to deconstruct CVE-2020-5902, and provides a hands-on demo of our lab covering this same vulnerability.
Topics covered include:
- How the exploit works
- How Java and Apache fits into the vulnerability
- How to use the exploit to download or upload files or run arbitrary shell commands
- Why products like F5’s BIG-IP contain such simple but powerful security holes
- How following best practices like attack surface management works
- And more
24 July 2020
Test your cyber mettle for free: Immersive Labs Community is now in public beta
12 October 2020
Research: Can you build spyware for a Fitbit?
9 October 2020
The more the merrier: four ways to build a more diverse cybersecurity team
30 September 2020
Think cyberattacks only hurt financially? Think again
28 September 2020
Staying cyber-safe in a remote working world
24 September 2020
Guest Blog: The Stress and Joy of Security Jobs
21 September 2020