Platform updates

[New scanner] Detect vulnerable F5 BIG-IP devices with Pentest-Tools.com

Publisher
Pentest-Tools.com
Updated at
Article tags

Vulnerability scanners are powerful pentesting tools that help you discover critical flaws in your systems quickly and effectively. The more specific the tools, the more useful!

To assess the security of your devices and see if they are exposed to the F5 BIG-IP critical vulnerability (CVE-2020-5902), we’ve launched a dedicated scanner you can try for free: the BIG-IP Vulnerability Scanner.

The high-severity vulnerability affects multiple F5 products that use the Traffic Management User Interface (TMUI) interface. It allows an unauthenticated attacker to execute remote commands as root on vulnerable devices.

Use the scanner for free

Here’s what data the BIG-IP Vulnerability Scanner sample report includes:

BIG-IP Vulnerability Scanner sample report

To better understand how CVE-2020-5902 is exploited, read our in-depth blog article, which includes a video demo and detailed steps to help you build a Proof of Concept with TMUI modules.

Use our new tool to scan your infrastructure fast and with minimal setup. Detect the TMUI RCE quickly and get a full report of the vulnerability, including description, evidence, risk, and recommendations for fixing it.

Scan your F5 BIG-IP device

Get fresh security research

In your inbox. (No fluff. Actionable stuff only.)

I can see your vulns image

Related articles

Suggested articles

Discover our ethical hacking toolkit and all the free tools you can use!

Create free account

Footer

© 2013-2025 Pentest-Tools.com

Deloitte Fast 500 EMEA 2023

One of EMEA's fastest-growing tech companies.

Recognized by Deloitte in their Fast 500 EMEA 2023 for sustained financial growth and impact.

48,000+ security folks are here. Are you?

Follow us on LinkedIn for practical offensive security tips, guides, and real talk.

More than demos - real faces, real insight.

Subscribe on Youtube to see our team demo the product, build PoCs, and share what drives us.

G2 x Gartner

Security leaders trust what they can prove

See why they choose accurate results, time-saving automation, and clear reporting on Gartner Peer Reviews and G2.