Threat actors are attempting to exploit recently fixed F5 BIG-IP flaw
Security Affairs
JULY 6, 2020
The vulnerability could be exploited by attackers to gain access to the TMUI component to execute arbitrary system commands, disable services, execute arbitrary Java code, and create or delete files, and potentially take over the BIG-IP device. The attacks against Warren’s honeypots originated from five different IP addresses.
Let's personalize your content