Man-in-the-middle attack in BIG-IP PEM - CVE-2017-6144
Published: October 24, 2017 / Updated: February 16, 2018
Vulnerability identifier: #VU8920
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6144
CWE-ID: CWE-300
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vendor: F5 Networks
Affected software:
BIG-IP PEM
BIG-IP PEM
Detailed vulnerability description
The vulnerability allows an adjacent attacker to conduct MITM-attack.
The weakness exists due to improper verification of certificates when the Type Allocation Code (TAC) database file is download via HTTPS. An adjacent attacker can use man-in-the-middle techniques to monitor the traffic from a user attempting to download the TAC database file via HTTPS and access or modify sensitive information in the TAC database file.
The weakness exists due to improper verification of certificates when the Type Allocation Code (TAC) database file is download via HTTPS. An adjacent attacker can use man-in-the-middle techniques to monitor the traffic from a user attempting to download the TAC database file via HTTPS and access or modify sensitive information in the TAC database file.
How to mitigate CVE-2017-6144
Update to version 12.1.2 HF 1 or 13.0.0.