CVE-2017-6144

In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected.
References
Link Resource
https://support.f5.com/csp/article/K81601350 Mitigation Vendor Advisory
https://support.f5.com/csp/article/K81601350 Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 03:29

Type Values Removed Values Added
References () https://support.f5.com/csp/article/K81601350 - Mitigation, Vendor Advisory () https://support.f5.com/csp/article/K81601350 - Mitigation, Vendor Advisory

Information

Published : 2017-10-20 15:29

Updated : 2024-11-21 03:29


NVD link : CVE-2017-6144

Mitre link : CVE-2017-6144

CVE.ORG link : CVE-2017-6144


JSON object : View

Products Affected

f5

  • big-ip_policy_enforcement_manager
CWE
CWE-295

Improper Certificate Validation