Forum Discussion

Amresh008's avatar
Amresh008
Icon for Nimbostratus rankNimbostratus
Jul 06, 2020

Community Question: K52145254: TMUI RCE vulnerability CVE-2020-5902

Editors Note: Authoritative answers for this CVE can be found at https://support.f5.com/csp/article/K52145254. -LZ.

 

This vulnerability was recently announced and steps were take as suggested (obviously!). If we see the Impact as mentioned:-

 

"This vulnerability allows for unauthenticated attackers, or authenticated users, with network access to the TMUI, through the BIG-IP management port and/or Self IPs, to execute arbitrary system commands, create or delete files, disable services, and/or execute arbitrary Java code. This vulnerability may result in complete system compromise.The BIG-IP system in Appliance mode is also vulnerable. This issue is not exposed on the data plane; only the control plane is affected."

 

Don't we want the authenticated admin to restart the services if and when required?

Also, one of the remedial steps as suggested is to edit the httpd properties as shown in document.

How does that stop an genuine authenticated (admin) user on LAN network or VPN who tries to restart the services ?

 

3 Replies