{"id":10982,"date":"2020-07-24T01:32:53","date_gmt":"2020-07-24T01:32:53","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=10982"},"modified":"2026-04-17T18:07:48","modified_gmt":"2026-04-17T18:07:48","slug":"f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/","title":{"rendered":"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\"><strong>Vulnerability Description<\/strong><\/h2>\n\n\n\n<p>Recently, NSFOCUS detected that F5 had updated its security advisory on the Traffic Management User Interface (TUMI) remote code execution vulnerability (CVE-2020-5902). The affected 15.x versions were changed to 15.0.0&acirc;&euro;&ldquo;15.1.0, and bypassable workarounds and validation methods were updated. By accessing the TUMI via the BIG-IP management port or their own IP addresses, unauthenticated attackers could craft malicious requests to obtain the privileges of target servers. The vulnerability has a CVSS score of 10. Currently, msf has integrated the exploit of the vulnerability. Users affected by the vulnerability are advised to take measures as soon as possible.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>F5 BIG-IP is an F5 application delivery platform that integrates the functions of network traffic management, application security management, and load balancing.<\/p>\n\n\n\n<p>NSFOCUS reproduced the vulnerability shortly after it was reported:<\/p>\n\n\n\n<p>File read:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"442\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-1-1024x442.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-10986\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-1-1024x442.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-1-300x130.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-1-768x332.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-1.jpg 1127w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Remote code execution:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"403\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-2-1024x403.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-10987\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-2-1024x403.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-2-300x118.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-2-768x302.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-2.jpg 1118w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/support.f5.com\/csp\/article\/K52145254\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Scope of Impact<\/strong><\/h2>\n\n\n\n<p><strong>Affected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>F5 BIG-IP 15.x&iuml;&frac14;&scaron;15.0.0 &#8211; 15.1.0<\/li><li>F5 BIG-IP 14.x&iuml;&frac14;&scaron;14.1.0 &#8211; 14.1.2<\/li><li>F5 BIG-IP 13.x&iuml;&frac14;&scaron;13.1.0 &#8211; 13.1.3<\/li><li>F5 BIG-IP 12.x&iuml;&frac14;&scaron;12.1.0 &#8211; 12.1.5<\/li><li>F5 BIG-IP 11.x&iuml;&frac14;&scaron;11.6.1 &#8211; 11.6.5<\/li><\/ul>\n\n\n\n<p><strong>Unaffected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>F5 BIG-IP 15.x&iuml;&frac14;&scaron;15.1.0.4<\/li><li>F5 BIG-IP 14.x&iuml;&frac14;&scaron;14.1.2.6<\/li><li>F5 BIG-IP 13.x&iuml;&frac14;&scaron;13.1.3.4<\/li><li>F5 BIG-IP 12.x&iuml;&frac14;&scaron;12.1.5.2<\/li><li>F5 BIG-IP 11.x&iuml;&frac14;&scaron;11.6.5.2<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Check for the Vulnerability<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Version Check<\/strong><\/h3>\n\n\n\n<p>(1) Run the following command in +TMOS shell (tmsh) to check the current version:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>show \/sys version<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"567\" height=\"154\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-10988\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-3.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-3-300x81.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/figure><\/div>\n\n\n\n<p>(2) Alternatively, log in to the Web management interface to check the current BIG-IP version:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"375\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-4-1024x375.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-10989\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-4-1024x375.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-4-300x110.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-4-768x281.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0724-4.jpg 1149w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>If it is within the scope of impact, the version is vulnerable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Detection with NSFOCUS Products<\/strong><\/h3>\n\n\n\n<p>NSFOCUS Remote Security Assessment System (RSAS) and Web Vulnerability Scanning System (WVSS) are capable of scanning and detecting the vulnerability (CVE-2020-5902). Please upgrade them to the latest versions.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&nbsp;<\/td><td><strong>Version<\/strong><\/td><td><strong>Download Link<\/strong><\/td><\/tr><tr><td><strong>RSAS V6 system plug-in package<\/strong><\/td><td>V6.0R02F01.1902<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/106313<\/td><\/tr><tr><td><strong>RSAS V6 web plug-in package<\/strong><\/td><td>V6.0R02F00.1801<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/106314<\/td><\/tr><tr><td><strong>WVSS 6.0 plug-in upgrade package<\/strong><\/td><td>V6.0R03F00.167<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/106312<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For how to configure NSFOCUS RSAS, click the following link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/mp.weixin.qq.com\/s\/aLAWXs5DgRhNHf4WHHhQyg\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mitigation<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\" type=\"I\"><li><strong>IV.1 &nbsp;Official Fix<\/strong><\/li><\/ul>\n\n\n\n<p>Currently, F5 has fixed this vulnerability in the latest version. Affected users are advised to upgrade as soon as possible by downloading the version from the following link: https:\/\/support.f5.com\/csp\/article\/K9502.<\/p>\n\n\n\n<p>For upgrade guide and notes, please visit https:\/\/support.f5.com\/csp\/article\/K13123.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Workarounds<\/strong><\/li><\/ul>\n\n\n\n<p>If it is impossible to upgrade currently, users can take the following mitigation measures:<\/p>\n\n\n\n<p>(1) In order to prevent unauthenticated attackers from exploiting the vulnerability, it is advised to add the configuration element LocationMatch to httpd (which can be locally performed via a command or remotely via the iControl REST interface). The procedure is as follows:<\/p>\n\n\n\n<p>a. Log in to TMOS Shell (tmsh) by running the following command:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>tmsh<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>b. Modify the httpd configuration file by running the following command:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>edit \/sys httpd all-properties<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>c. Modify the content of &lt;include&gt; as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>include &#8216; &lt;LocationMatch &#8220;;&#8221;&gt; Redirect 404 \/ &lt;\/LocationMatch&gt; &lt;LocationMatch &#8220;hsqldb&#8221;&gt; Redirect 404 \/ &lt;\/LocationMatch&gt; &#8216;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>d. Press Esc and input the following command to save modifications to the configuration file:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>:wq!<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>e. Run the following command to save the changes:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>save \/sys config<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>f. Run the following command to restart the httpd service and make the modified configuration file take effect:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>restart sys service httpd<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>(2) Users are advised to deny TMUI access to external IP addresses or allow TMUI access for administrators only in a secure network environment.<\/p>\n\n\n\n<p>Note: The vulnerability cannot be completely mitigated by the aforesaid two methods and may still be exploited by authenticated users who have access to TMUI.<\/p>\n\n\n\n<p>(3) The Self IPs policy can be used to block all access to TMUI of the BIG-IP system. The procedure is as follows:<\/p>\n\n\n\n<p>Change the setting of Port Lockdown in each Self IP of the system into Allow None. If ports must be opened, Allow Custom can be used, and access to the TMUI port must be prohibited.<\/p>\n\n\n\n<p>Note: The third method can prevent all access to the TMUI\/Configuration utility via the Self IP, but it may affect other services.<\/p>\n\n\n\n<p><strong>Verification method<\/strong><\/p>\n\n\n\n<p>Users can access the following URLs to verify whether the mitigation measures are effective:<\/p>\n\n\n\n<p>https:\/\/[IP ADDRESS]\/tmui\/login.jsp\/..;\/login.jsp<\/p>\n\n\n\n<p>https:\/\/[IP ADDRESS]\/hsqldb%0a<\/p>\n\n\n\n<p>If the mitigation measures are successful, a 404 response will be received.<\/p>\n\n\n\n<ul class=\"wp-block-list\" type=\"I\"><li><strong>Protection with NSFOCUS Products<\/strong><\/li><\/ul>\n\n\n\n<p>The current rule (No. 27526188) of NSFOCUS Web Application Firewall (WAF) can protect against the vulnerability. Users are advised to update the rules as soon as possible to enable the product to provide effective protection. The following table lists rule library versions of NSFOCUS WAF.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&nbsp;<\/td><td><strong>Version<\/strong><\/td><td><strong>Download Link<\/strong><\/td><\/tr><tr><td><strong>WAF 6.0.4.0 rule library update package<\/strong><\/td><td>6.0.4.1.45556<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/106064<\/td><\/tr><tr><td><strong>WAF 6.0.7.0 rule library update package<\/strong><\/td><td>6.0.7.0.45556<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/106063<\/td><\/tr><tr><td><strong>WAF 6.0.7.1 rule library update package<\/strong><\/td><td>6.0.7.1.45556<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/106061<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For how to update product rules, click the following link:<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/mp.weixin.qq.com\/s\/oubjPqR4DURWPvrQ9W9mWA\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Statement<\/strong><\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About NSFOCUS<\/strong><\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description Recently, NSFOCUS detected that F5 had updated its security advisory on the Traffic Management User Interface (TUMI) remote code execution vulnerability (CVE-2020-5902). The affected 15.x versions were changed to 15.0.0&acirc;&euro;&ldquo;15.1.0, and bypassable workarounds and validation methods were updated. By accessing the TUMI via the BIG-IP management port or their own IP addresses, unauthenticated [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10318,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[403],"class_list":["post-10982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-f5"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description Recently, NSFOCUS detected that F5 had updated its security advisory on the Traffic Management User Interface (TUMI) remote code\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-24T01:32:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description Recently, NSFOCUS detected that F5 had updated its security advisory on the Traffic Management User Interface (TUMI) remote code\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert\",\"datePublished\":\"2020-07-24T01:32:53+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/\"},\"wordCount\":1092,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"keywords\":[\"F5\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/\",\"name\":\"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"datePublished\":\"2020-07-24T01:32:53+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/0424-2.jpg\",\"width\":625,\"height\":322,\"caption\":\"Futuristic digital landscape with glowing blue lines.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS","og_description":"Vulnerability Description Recently, NSFOCUS detected that F5 had updated its security advisory on the Traffic Management User Interface (TUMI) remote code","og_url":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2020-07-24T01:32:53+00:00","article_modified_time":"2026-04-17T18:07:48+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS","twitter_description":"Vulnerability Description Recently, NSFOCUS detected that F5 had updated its security advisory on the Traffic Management User Interface (TUMI) remote code","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert","datePublished":"2020-07-24T01:32:53+00:00","dateModified":"2026-04-17T18:07:48+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/"},"wordCount":1092,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","keywords":["F5"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/","name":"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","datePublished":"2020-07-24T01:32:53+00:00","dateModified":"2026-04-17T18:07:48+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0424-2.jpg","width":625,"height":322,"caption":"Futuristic digital landscape with glowing blue lines."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/f5-big-ip-tmui-remote-code-execution-vulnerability-cve-2020-5902-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"F5 BIG-IP TMUI Remote Code Execution Vulnerability (CVE-2020-5902) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=10982"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10318"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=10982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=10982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=10982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}