After F5 proofs of concept are published, potential hackers get to work

After F5 proofs of concept are published, potential hackers get to work


After F5 proofs of concept are published, potential hackers get to work
Hacking attempts on F5’s BIG-IP and BIG-IQ have increased after four critical vulnerabilities were discovered in the products March 10. (F5)

After proofs of concept for vulnerabilities in F5’s BIG-IP and BIG-IQ products were published March 18, several researchers have logged upticks in hacking attempts and mass vulnerability scans.

A set of four critical F5 BIG-IP and BIG-IQ vulnerabilities came to light March 10, with the company and CISA both immediately advising customers patch. These are a different set of vulnerabilities than ones that surfaced last summer.

Three proofs of concept for a remote code execution vulnerability CVE-2021-22986 were published March 17. The next day, Bad Packets started to notice mass scanning for vulnerability.

“The scanning activity increased in magnitude and started using a viable payload to check which servers are vulnerable,” wrote Troy Mursch, Bad Packets chief research officer, via email.

Until then, there were fewer scans, either with no payload or using one that NCC Group deemed non-functional. Rich Warren, principal security consultant at NCC Group, wrote in an email that the early attempts at exploitation were based on limited information in the public domain that was not enough to launch an attack.

NCC Group has also noticed an uptick in activity after the publication of working proofs of concept.

“The activity appears opportunistic and non-targeted in nature. The attackers are hitting multiple honeypots in different regions, suggesting that there is no specific targeting. It is more likely that they are ‘spraying’ attempts across the internet, in the hope that they can exploit the vulnerability before organizations have a chance to patch it,” Warren wrote.

Warren said NCC Group has seen attempts from multiple IP addresses with “all attempts [containing] some specific hallmarks which are consistent with the other attempts, suggesting it’s likely the same underlying exploit.” Mursch said Bad Packets had additionally found some use of the Tor network to disguise would-be hackers’ tracks.

A representative from F5 said the firm was aware of the recent activity.

“As with all critical vulnerabilities, we advise customers update their systems as soon as possible,” he said.





Source link

Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *