Critical Vulnerabilities in F5 Software, Patch Now

NJCCIC Advisory

Original Release Date: 2/28/2021

Summary

Several vulnerabilities, including four critical remote code execution flaws, in F5 Networks BIG-IP (all models prior to version 16.0.1.1 and Advanced WAF/ASM prior to 16.0.1.1) and BIG-IQ (prior to version 8.0.0) software were disclosed on March 10, 2021. The most severe of these vulnerabilities could allow a remote threat actor with access to the interface to execute arbitrary commands on vulnerable BIG-IP systems and, depending on the privileges associated with the user, fully compromise the system.

Recommendations

The NJCCIC highly advises organizations to update vulnerable F5 software as soon as possible, after appropriate testing. Additionally, organizations are encouraged to follow the principle of least privilege to limit the impact of a compromised system. Additional details on these vulnerabilities can be found in the F5 Security Advisory and Bleeping Computer article.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.