Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Government Issues Warning to Users of F5 and Cisco Cybersecurity Products

Reading Time: < 1 minute

The Indian Computer Emergency Response Team (CERT-In) has issued a warning to users regarding a critical vulnerability in F5’s BIG-IP, a popular multi-cloud application services and security product. This vulnerability could potentially be exploited by remote attackers to execute craft DNS queries or cause a Denial of Service (DoS) attack on the targeted system.

According to CERT-In, the vulnerability in F5 BIG-IP is a result of flooding the target server with queries. A remote attacker could take advantage of this flaw by crafting queries on the affected ‘named’ instance, leading to excessive CPU load on the targeted system. Successful exploitation of this vulnerability could have serious consequences, including the execution of craft DNS queries or causing a DoS condition.

In light of this security risk, CERT-In has strongly recommended that users apply the necessary updates to mitigate the vulnerability and protect their systems from potential attacks.

Additionally, CERT-In has also alerted users to a separate vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) related to the Out-of-Band (OOB) and Plug and Play (PnP) feature. This flaw could allow an unauthenticated, remote attacker to read arbitrary files on the targeted system. The vulnerability stems from an unauthenticated provisioning web server in the OOB and PnP feature of Cisco NDFC, which could be exploited through direct web requests to the provisioning server.

Users are advised to stay vigilant, apply security patches promptly, and take necessary precautions to safeguard their systems from potential cyber threats.

Taylor Swifts New Album Release Health issues from using ACs Boston Marathon 2024 15 Practical Ways To Save Money