CISA has issued a warning about a vulnerability in unencrypted persistent cookies in the F5 BIG-IP Local Traffic Manager (LTM) module. This issue poses a risk for organizations using F5 BIG-IP, as it can be exploited by cybercriminals.
CISA warns that cybercriminals are using unencrypted persistent cookies to discover details about non-internet- facing devices on networks. This information can help them find and exploit vulnerabilities in other systems, increasing risks for organizations as attackers can gain broader access across the network.
By infosecbulletin
/ Friday , April 18 2025
According to Shadowserver Foundation around 17,000 Fortinet devices worldwide have been compromised using a new technique called "symlink". This number...
Read More
By infosecbulletin
/ Friday , April 18 2025
A critical security flaw has been found in the Erlang/Open Telecom Platform (OTP) SSH implementation, allowing an attacker to run...
Read More
By infosecbulletin
/ Thursday , April 17 2025
On Wednesday, CISA alerted about increased breach risks due to the earlier compromise of legacy Oracle Cloud servers, emphasizing the...
Read More
By infosecbulletin
/ Thursday , April 17 2025
Cisco issued a security advisory about a serious vulnerability in its Webex App that allows unauthenticated remote code execution (RCE)...
Read More
By infosecbulletin
/ Thursday , April 17 2025
On Wednesday, Apple released urgent operating system updates to address two security vulnerabilities that had already been exploited in highly...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
On April 15, 2025, Oracle released a Critical Patch Update for 378 flaws for its products. The patch update covers...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
Check Point Research warns of the active exploitation of a new vulnerability, CVE-2025-24054, which lets hackers leak NTLMv2-SSP hashes using...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
Bengaluru's Whiteboard Technologies Pvt Ltd was hit by a ransomware attack, with hackers demanding a ransom of up to $70,000...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
MITRE Vice President Yosry Barsoum warned that U.S. government funding for the Common Vulnerabilities and Exposures (CVE) and Common Weakness...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
PwC has ceased operations in more than a dozen countries that its global bosses have deemed too small, risky or...
Read More
The F5 BIG-IP LTM module uses persistent cookies for session continuity but can be vulnerable if these cookies are unencrypted. Attackers can exploit this to gather network information. F5 states that enabling cookie encryption uses a 192-bit AES cipher followed by Base64 encoding, which is crucial for protecting cookies from unauthorized access.
Without encryption, these cookies allow attackers to access the internal network structure, revealing details about other devices and their setups. This information can help them exploit vulnerabilities in the network.
CISA recommends that organizations using F5 BIG-IP devices encrypt their persistent cookies to mitigate risks. They also advise reviewing F5’s guidelines for properly configuring the BIG-IP LTM system for encrypted HTTP cookies. Additionally, F5 offers iHealth, a tool that alerts users when cookie encryption is disabled.
F5 BIG-IP solutions are widely used in various industries, including finance and healthcare. The vulnerability of unencrypted cookies poses risks like session hijacking and allows attackers to explore the network. Encrypting these persistent cookies can help organizations lessen their attack surface and safeguard their internal network from cyber threats.