26 Dec


Dedicated to creating the net and cloud a secure place to be, F5 Networks offers a good vary of security and protection solutions to businesses and individuals.  The protection offered aims at multiple aspects comparable to North American nationer access, verification, security compliances, computer address protection, server defense, then on. 

In a nutshell, the organization has one thing or alternative to safeguard your digital assets and keep cyber dangers at bay. However, there are a few of examples around us whereby threat actors have bypassed F5 Networks protection and managed to make disturbance on the far side our understanding. F5 bypassHow repeatedly has the F5 Networks defense been bypassed in 2020-2021?

The unconscious process that F5 Networks offers is top-notch and is tough to bypass. However, despite the high claims of providing top-notch protection, F5 Networks didn't stay unaffected by the bypassing. Threat actors and hackers remained a step earlier than the organization, managed to work out the present loopholes within the F5 Networks solutions, and bypassed the protection wall easily. 

f5 bypassed half-dozenIf recorded information is to be believed, around 6 times the F5 Networks security was broken or bypassed in 2020-2021.From the GitHub community, we have a tendency to managed to assemble info regarding Networks BIG-IP: UNIX kernel vulnerabilities (K31026324) Nessus plugin, F5 Networks massive-IP: PHP vulnerability (K13588), K51213246: BIG-IP APM AD authentication vulnerability, and F5 Networks BIG-IP: OpenSSL vulnerability (K15159). 

f5 sorts bypassedWhat is F5 BIG information science ASM? F5 IP ASM is that the most notable providing within the domain of net threat protection and regulative compliance. Basically, it’s a feature-rich web application firewall capable of detective work and mend the potential threats in the applications operational in several ecosystems comparable to customary, private, and virtual clouds.   

Using a high-end algorithm, the tool will the first detection of visible and hidden vulnerabilities and helps organizations to satisfy the necessities to attain key mandates.  It’s not a complete solution. Rather, it’s one amongst the notable offerings of the F5 application delivery firewall solutions. Along with massive-IP ASM, the opposite offered solutions are a network firewall, SSL inspection, traffic management, DNS security, DDoS protection, and application access.  

The tool attains its comprehensive security delivery via obstruction access and traffic coming back from suspicious sources.Web applications are largely secured from DDoS and SQL injection attacks whereas this tool is in action. netsites came into being victimization the most recent technologies like Google Web Toolkit and mythical being widgets are compatible with the tool.F5 BIG IPHow to bypass the shopper on F5 massive information science ASM? 

As mentioned above, F5 massive IP ASM bypass is feasible and has already happened before. one amongst the foremost talked-about bypassing incidents was the BIG-IP APM AD authentication vulnerability CVE-2021-23008. it had been known because the KDC (Key Distribution Center) spoofing imperfect and caused a good sensation. Let’s perceive however it worked and what was the method that created it work. The drawback was found within the APM – the software system resolution getting used for managing the user access flow. Hacker was utilizing a spoofed AS-REP to enter the APM AD, i.e. Active Directory of BIG-IP. AS-REP is an authentication-related response for Kerberos services. 

This response ought to be shared or sent to a nicked KDC or Kerberos KDC connection. In its absence, it may also be forwarded via a commercial server that has been compromised. Using this KDC spoofing vulnerability (called CVE-2021-23008), any threat actor can skip security checks and have an effect on crucial workflows. it had been robust enough to travel round the Kerberos security deployment, allowing the hacker to manage the Access Policy Manager. It even lets threat actors reach the admin console in an exceedingly few scenarios.

 Steps followed to BIG-IP APM AD were:Creating a false KDC and accessing the username essential to realize access to the targeted F5 Networks services.Create a user profile within the falsified KDC and use it to perform the AD access management of BIG-IP APM.Taking over client-DC talks and amusing it to the counterfeit KDC. While AS exchange is taking place, the aggressor will come the AS_REP request joined with the attacker-owned positive identification and false KDC key. The attacker then returns random TGS_REP throughout TGS exchange. End-user will consent to the solid AD authentication while not the appliance exchange.

How to stop F5 BIG-IP APM bypassing? Bypassing security solutions isn't acceptable and will be mounted immediately. When this vulnerability was noticed F5 took immediate action and discharged an inventory of suggested remedial actions.The list mentioned the vulnerable versions of BIG-IP APM. folks or organizations who were victimization the vulnerable version were given a patch and required steering to stop threat actors from harming them. detain mind that CVE-2021-23008 is non-fixable in 11.5.2 – 11.6.5 versions.In a couple of versions, auto-version update was the sole resolution needed to eliminate the problems whereas few demanded extended efforts like BIG-IP APM access policy reformation and system access management technique audit and improvement. 

As way as APM access policy reformation is concerned, one will utilize multi-factor authentication and apply host-level authentication constraints additionally to it.The BIG-IP system needs AD authentication by default. However, rather than this, you will deploy a foreign authentication option, mentioned within the User Directory. you need to guarantee memorizing a remote authentication backed by the facility of SSL.One must pay attention for the access management procedure followed in Kerberos at every step and establish any surprising action in the early stage. 

For instance, AS_REQ resources requests ought to solely be accepted. Also, the absence of TGS_REQs could be an horrific situation. Wireshark is a useful gizmo to work this out. Make sure the Kerberos protocol implementation isn't completed while not the validation and will be completed with the assistance of a keytab or password. This makes KDC spoofing more durable than usual and keeps the exploitation odds on the lower side.Services that don't seem to be driven by the service tickets should be searched completely for the authentication logs to stay the risks at bay.

How is that the F5 WAF bypass possible?It has been realized that F5 WAF bypass is feasible by victimization the commands like “rev” & “printf” for command substitution practicality in Bash shell. you will provides it a attempt to allow us to apprehend if it works.

* Адрес электронной почты не будет отображаться на сайте.