""ET EXPLOIT F5 TMUI RCE vulnerability CVE-2020-5902 Attempt M1""
SID: 2030469
Revision: 5
Class Type: attempted-admin
Metadata: affected_product Web_Server_Applications, attack_target Networking_Equipment, created_at 2020_07_05, cve CVE_2020_5902, deployment Perimeter, deployment SSLDecrypt, signature_severity Critical, updated_at 2020_07_08
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: any
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "/tmui/login.jsp" Depth: 15
-
Value: "|3b|"
Within:
PCRE:
Special Options:
-
fast_pattern
-
http_uri
-
http_uri