Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion



Hackers can exploit them to gain full administrative control of internal devices.