

Rewterz Threat Advisory –Multiple Zyxel Products Vulnerabilities
May 4, 2023
Rewterz Threat Alert – APT-C-35 aka Donot Team – Active IOCs
May 4, 2023
Rewterz Threat Advisory –Multiple Zyxel Products Vulnerabilities
May 4, 2023
Rewterz Threat Alert – APT-C-35 aka Donot Team – Active IOCs
May 4, 2023Severity
High
Analysis Summary
CVE-2023-27378 CVSS:7.5
F5 BIG-IP is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-24461 CVSS:7.4
F5 NGINX Management Suite could allow a remote attacker to bypass security restrictions, caused by improper certificate validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to impersonate a BIG-IP APM system.
CVE-2023-28742 CVSS:7.2
F5 BIG-IP (DNS) could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw in in DNS iQuery mesh when DNS is provisioned. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
Impact
- Cross-Site Scripting
- Bypass Security
Indicators Of Compromise
CVE
- CVE-2023-27378
- CVE-2023-24461
- CVE-2023-28742
Affected Vendors
F5
Affected Products
- F5 BIG-IP 13.1.0
- F5 BIG-IP 15.1.0
- F5 BIG-IP 14.1.0
- F5 BIG-IP 16.1.0
- F5 BIG-IP (APM) 14.1.0
- F5 BIG-IP (APM) 13.1.0
- F5 BIG-IP (APM) 15.1.0
- F5 BIG-IP (APM) 16.1.0
- F5 BIG-IP (DNS) 13.1.0
- F5 BIG-IP (DNS) 14.1.0
- F5 BIG-IP (DNS) 15.1.0
- F5 BIG-IP (DNS) 13.1.5
Remediation
Refer to F5 Security Advisory for patch, upgrade or suggested workaround information.