View this email in your browser
Dear <<First Name>>,

As promised, we’re keeping you up to date with new scanners we add to the platform. 
 If you read about the F5 BIG-IP critical vulnerability (CVE-2020-5902), you probably want a faster, more focused way of finding out if it impacts your devices.
To help you easily detect this high-severity vuln, we’ve just released a dedicated scanner you can try for free: the BIG-IP Vulnerability Scanner.
TL;DR The issue affects a range of F5 products that use the Traffic Management User Interface (TMUI) interface. It allows an unauthenticated attacker to execute remote commands as root on vulnerable devices.
Try the new scanner for free
Here’s a sample of the BIG-IP Vulnerability Scanner report:

Eager to better understand how attackers exploit CVE-2020-5902?

Read our in-depth technical review and build your own PoC with TMUI modules! Video demo and detailed steps included.

Use our new tool to scan your infrastructure fast and with minimal setup. Detect the TMUI RCE quickly and get a full report of the vulnerability, including description, evidence, risk, and recommendations for fixing it. 

Scan your F5 BIG-IP devices

Reply to this email anytime and let us know how we can make more useful for you!

The Team

Let's stay in touch!
Copyright © 2020 PentestTools SRL, All rights reserved.
You are receiving this email because you opted in at our website or used in the past.

Our mailing address is:
PentestTools SRL
Caderea Bastiliei 64, 1st Floor
Bucharest, Romania EU

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list.