Whether you use F5 products or not, CVE-2020-5902 is still an important vulnerability to understand because you certainly use other products that share the same vulnerable components as the F5 BIG-IP products. There are a ton of lessons to be learned from this exploit that can be applied broadly. One lesson in particular is that we really should assume that all products we use harbor the same secure coding violations that underly CVE-2020-5902 and take pre-emptive action to limit risk.
In this webinar, our own Director of Cyber Threat Research, Kev Breen, joins the experts at Ultimate Windows Security and Randori to deconstruct CVE-2020-5902, and provides a hands-on demo of our lab covering this same vulnerability.
Topics covered include:
- How the exploit works
- How Java and Apache fits into the vulnerability
- How to use the exploit to download or upload files or run arbitrary shell commands
- Why products like F5’s BIG-IP contain such simple but powerful security holes
- How following best practices like attack surface management works
- And more
24 July 2020
Continuous integration means continuously embedding security skills
20 January 2021
Cyberattacks are hammering businesses and public sector organizations – but when is it really a crisis?
18 January 2021
Immersive Labs is officially one of the best places to work in Boston!
11 January 2021
Cyber Crisis Simulator: ransomware cripples major energy supplier – live it and learn
6 January 2021
When the sun bursts: responding to global cyber events
22 December 2020
Feel the heat of SUNBURST with Immersive Labs (so your business won’t have to)
18 December 2020