Exploiting F5 BIG-IP: Deconstructing This Simple But Deadly RCE

Whether you use F5 products or not, CVE-2020-5902 is still an important vulnerability to understand because you certainly use other products that share the same vulnerable components as the F5 BIG-IP products. There are a ton of lessons to be learned from this exploit that can be applied broadly. One lesson in particular is that we really should assume that all products we use harbor the same secure coding violations that underly CVE-2020-5902 and take pre-emptive action to limit risk.

In this webinar, our own Director of Cyber Threat Research, Kev Breen, joins the experts at Ultimate Windows Security and Randori to deconstruct CVE-2020-5902, and provides a hands-on demo of our lab covering this same vulnerability.

Topics covered include:

  • How the exploit works
  • How Java and Apache fits into the vulnerability
  • How to use the exploit to download or upload files or run arbitrary shell commands
  • Why products like F5’s BIG-IP contain such simple but powerful security holes
  • How following best practices like attack surface management works
  • And more
TOPICS
Blue Team
Red Team
Webinar
PUBLISHED

24 July 2020

We help businesses to increase and evidence human capability in every part of cybersecurity.

Legal