5.8
CVSSv2

CVE-2017-6144

Published: 20/10/2017 Updated: 15/11/2017
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

In F5 BIG-IP PEM 12.1.0 up to and including 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected.

Vulnerable Product Search on Vulmon Subscribe to Product

f5 big-ip policy enforcement manager 12.1.0

f5 big-ip policy enforcement manager 12.1.1

f5 big-ip policy enforcement manager 12.1.2