Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Attackers are exploiting a recently-patched, critical vulnerability in F5 devices that have not yet been updated. Previously identified as unauthenticated remote command execution flaw (CVE-2021-22986) which exists in F5BIG-IP and BIG-IQ enterprise networking infrastructure, and could allow attackers to take full control over a vulnerable system.
Researchers have said that the last 24 hours have been critically observed and they have observed multiple exploitation attempts against their honeypot infrastructure. “NCC researchers said”. For this latest rash of exploit attempts, anyone running an affected version of BIG-IP should prioritize upgrade.
F5 BIG-IP could allow a remote attacker to execute arbitrary commands on the system, caused by an error in the iControl REST interface. An attacker could exploit this vulnerability using the control plane to execute arbitrary system commands, create or delete files, and disable services.
F5
Users are advised to update to the latest version to avoid exploitation.
https://support.f5.com/csp/article/K02566623
Link to the published advisory.