CVE-2020-5902# 🔴 **CVE-2020-5902: Critical RCE in F5 BIG-IP** 🚨

> *"Unauthenticated attackers can execute **arbitrary code** on your BIG-IP — **full compromise possible**!"* 😱
---
## 🎯 **Quick Summary**
- **Type**: Remote Code Execution (RCE) 💻
- **CVSS Score**: **9.8 / Critical** 🔥
- **Access**: **Unauthenticated** 🌐
- **Exploit**: Publicly available (Metasploit module) 🛠️
- **Status**: Actively exploited since **July 2020** ⚔️
---
## 🛡️ **Affected BIG-IP Modules**
<img width="1024" height="555" alt="_microsoftteams-image-36" src="https://github.com/user-attachments/assets/f9846de5-7711-43c6-846c-ab3763b6168e" />
| Module | Status |
|-------|--------|
| LTM, AAM, AFM | ❌ Vulnerable |
| Analytics, APM, ASM | ❌ Vulnerable |
| PEM, WebAccelerator | ❌ Vulnerable |
| **BIG-IQ / VE** | ✅ **Not Affected** |
---
## 📊 **Vulnerable Versions** (Patch **NOW**!)
| Version Range | Fixed In |
|---------------|----------|
| `15.1.0 – 15.1.0.5` | `15.1.0.6+` ✅ |
| `14.1.0 – 14.1.2.1` | `14.1.2.2+` ✅ |
| `13.1.0 – 13.1.3.3` | `13.1.3.4+` ✅ |
| `12.1.0 – 12.1.5.2` | `12.1.5.3+` ✅ |
| `11.6.1 – 11.6.5.2` | `11.6.5.3+` ✅ |
> **Only TMUI (port 443) exposed?** → Still **at risk** if unpatched! 🔓
---
## ⚡ **How Attackers Exploit It**
<img width="1200" height="782" alt="CVE-2020-5902-fig8" src="https://github.com/user-attachments/assets/0a223b86-95b7-45f0-9896-4af08481ca81" />
1. Send crafted HTTP request to `/tmui/` 🌐
2. Trigger directory traversal + RCE 🕳️
3. Run shell commands, delete files, or steal data 💾
> **Bypass Alert**: Early iRule mitigations were **quickly bypassed**! 🚫
---
## 🛑 **Immediate Actions**

| Action | Priority |
|-------|----------|
| **Upgrade to fixed version** | 🔥 **Critical** |
| Restrict TMUI to trusted IPs | 🔒 **High** |
| Block `/tmui/` via firewall | 🛑 **Medium (temporary)** |
| Scan with Nessus / Qualys | 🔍 **Now** |
---
## 🔗 **Official Resources**
- [F5 Advisory (K52145254)](https://support.f5.com/csp/article/K52145254) 📜
- [NVD Detail](https://nvd.nist.gov/vuln/detail/CVE-2020-5902) 📋
- [CISA Alert](https://www.cisa.gov/news-events/alerts/2020/07/04/f5-releases-security-advisory-big-ip-tmui-rce-vulnerability-cve-2020-5902) 🚨
---
## ⏰ **Still Unpatched in 2025?**
> **You’re a prime target.**
> Hackers scan for this **daily** with Shodan & mass exploits. 🕵️♂️
---
**Patch it. Lock it. Log it.**
Your BIG-IP deserves better. 💪✨
[4.0K] /data/pocs/ce1ea099967745c39d5da926f805b3e7f890944b
└── [2.7K] README.md
1 directory, 1 file