7.4
CVE-2017-6144
- EPSS 0.17%
- Veröffentlicht 20.10.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle f5sirt@f5.com
- CVE-Watchlists
- Unerledigt
In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5 ≫ Big-ip Policy Enforcement Manager Version12.1.0
F5 ≫ Big-ip Policy Enforcement Manager Version12.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version12.1.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.17% | 0.39 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.4 | 2.2 | 5.2 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
| nvd@nist.gov | 5.8 | 8.6 | 4.9 |
AV:N/AC:M/Au:N/C:P/I:P/A:N
|
CWE-295 Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.