May 8, 2024, 4 p.m. | Chris Garland

Security Boulevard securityboulevard.com

Our ongoing research has identified remotely exploitable vulnerabilities in F5’s Next Central Manager that can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next Central Manager. These attacker-controlled accounts would not be visible from the Next Central Manager itself, enabling ongoing […]


The post Big Vulnerabilities in Next-Gen BIG-IP appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.


The post Big Vulnerabilities …

accounts assets attacker attackers big big-ip blog can control device exploitable vulnerabilities gen managed manager next research visible vulnerabilities

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Computer and Forensics Investigator

@ ManTech | 221BQ - Cstmr Site,Springfield,VA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India