Description
In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-15209 | In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K81601350 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-09-17T00:40:56.361Z
Reserved: 2017-02-21T00:00:00.000Z
Link: CVE-2017-6144
No data.
Status : Deferred
Published: 2017-10-20T15:29:00.427
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-6144
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD