Forum Discussion
Nathan_F__F5_
Jul 11, 2019Employee
Hi wazir,
If I am understanding the description correctly then the attacker would need access to the database itself. I believe that this would mean your F5 device should be safe as long as the attacker can't login to the device. I would recommend that you simply ensure that access to the device is secure. The following article should hopefully be useful.
K13092: Overview of securing access to the BIG-IP system
https://support.f5.com/csp/article/K13092
-Nathan F