Whether you use F5 products or not, CVE-2020-5902 is still an important vulnerability to understand because you certainly use other products that share the same vulnerable components as the F5 BIG-IP products. There are a ton of lessons to be learned from this exploit that can be applied broadly. One lesson in particular is that we really should assume that all products we use harbor the same secure coding violations that underly CVE-2020-5902 and take pre-emptive action to limit risk.
In this webinar, our own Director of Cyber Threat Research, Kev Breen, joins the experts at Ultimate Windows Security and Randori to deconstruct CVE-2020-5902, and provides a hands-on demo of our lab covering this same vulnerability.
Topics covered include:
- How the exploit works
- How Java and Apache fits into the vulnerability
- How to use the exploit to download or upload files or run arbitrary shell commands
- Why products like F5’s BIG-IP contain such simple but powerful security holes
- How following best practices like attack surface management works
- And more
24 July 2020
Cyber preparedness lessons from the trenches
30 July 2020
Build capabilities, not just plans
29 July 2020
Most organizations now expect to be hacked, so why is incident response being neglected?
28 July 2020
Hacking in Hollywood: our experts review
23 July 2020
Less stress, more success: how psychological safety affects your team’s performance
21 July 2020