Saturday , March 29 2025
F5

(CVE–2023-46747)
Hacker exploit Critical F5 BIG -IP Vulnerability in Bangladesh: CIRT report

Cyber Threat Intelligence Unit of BGD e-GOV CIRT found evidence of compromise linked to the vulnerability in F5 BIG-IP systems used in Bangladesh’s IT infrastructure. Investigators discovered that attackers gained shell access to the system and tried to sell this unauthorized access on the dark web.

Source: BGD e-Gov CIRT

On October 30, one attacker claimed to have root-level access to a server, initially offering it for a fixed price, which increased to $2,500 by November 4.

FBI investigating cyberattack at Oracle, Bloomberg News reports

The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle (ORCL.N), opens new tab that has led to...
Read More
FBI investigating cyberattack at Oracle, Bloomberg News reports

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

CIRT alert Situational Awareness for Eid Holidays

As the Eid holidays near, cybercriminals may try to take advantage of weakened security during this time. The CTI unit...
Read More
CIRT alert Situational Awareness for Eid Holidays

Cyberattack on Malaysian airports: PM rejected $10 million ransom

Operations at Kuala Lumpur International Airport (KLIA) were unaffected by a cyber attack in which hackers demanded US$10 million (S$13.4...
Read More
Cyberattack on Malaysian airports: PM rejected $10 million ransom

Micropatches released for Windows zero-day leaking NTLM hashes

Unofficial patches are available for a new Windows zero-day vulnerability that allows remote attackers to steal NTLM credentials by deceiving...
Read More
Micropatches released for Windows zero-day leaking NTLM hashes

VMware Patches Authentication Bypass Flaw in Windows Tool

On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools for Windows. CVE-2025-22230 allows a...
Read More
VMware Patches Authentication Bypass Flaw in Windows Tool

IngressNightmare
Over 40% of cloud environments are vulnerable to RCE

Kubernetes users of the Ingress NGINX Controller are advised to fix four newly found remote code execution ( RCE) vulnerabilities,...
Read More
IngressNightmare  Over 40% of cloud environments are vulnerable to RCE

(CVE-2025-29927)
Urgently Patch Your Next.js for Authorization Bypass

Next.js, a widely used React framework for building full-stack web applications, has fixed a serious security vulnerability. Used by many...
Read More
(CVE-2025-29927)  Urgently Patch Your Next.js for Authorization Bypass

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
Oracle refutes breach after hacker claims 6 million data theft

Analysis confirmed CVE-2023-46747, a authentication bypass vulnerability in F5 BIG-IP systems that allows attackers to execute remote code and access the Traffic Management User Interface (TMUI) without authentication. This vulnerability can give attackers full administrative control and has been exploited alongside CVE-2023-46748, a high-severity SQL injection flaw seen in active attacks reported by F5.

CVE-2023-46747 vulnerability overview:

On October 25, 2023, cybersecurity firm Praetorian announced a critical vulnerability (CVE-2023-46747) in F5 BIG-IP systems, allowing unauthenticated attackers to gain full administrative access due to poor input validation. This vulnerability has a CVSS score of 9.8.

The next day, F5 confirmed this issue and also reported a high-severity SQL injection flaw (CVE-2023-46748) with a CVSS score of 8.8, which is being exploited alongside the first vulnerability, heightening risks for affected systems.

Source: BGD e-Gov CIRT

Affected Versions:

BIG-IP Versions Prior to 17.0: All versions preceding 17.0 are vulnerable.
Exposed Management Interfaces: Deployments with publicly accessible management interfaces, particularly those lacking strict access controls or IP restrictions, are at heightened risk.

To reduce risks from CVE-2023-46747, CIRT advices organizations using F5 BIG-IP systems should take these steps:

Patch Deployment: Install the latest security updates from F5 to fix this issue.

Restrict Access: Allow access to the F5 BIG-IP management interface only from internal IPs.

Implement Multi-Factor Authentication (MFA): Require all users to use MFA for accessing the BIG-IP management portal to improve security.

Enhanced Logging and Monitoring: Turn on detailed logging on BIG-IP systems and watch for unusual behavior, especially regarding privileged actions.

Isolate Compromised Systems: Isolate any compromised systems and conduct a thorough investigation.

Hacker offer Titas gas root access to sale

Check Also

CheckPoint

Cybercriminals Exploit Checkpoint’s Driver in a BYOVD Attack

Threat actors are exploiting a component of CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures. …

Leave a Reply

Your email address will not be published. Required fields are marked *