Description
In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-15209 | In F5 BIG-IP PEM 12.1.0 through 12.1.2 when downloading the Type Allocation Code (TAC) database file via HTTPS, the server's certificate is not verified. Attackers in a privileged network position may be able to launch a man-in-the-middle attack against these connections. TAC databases are used in BIG-IP PEM for Device Type and OS (DTOS) and Tethering detection. Customers not using BIG-IP PEM, not configuring downloads of TAC database files, or not using HTTP for that download are not affected. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K81601350 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-09-17T00:40:56.361Z
Reserved: 2017-02-21T00:00:00.000Z
Link: CVE-2017-6144
No data.
Status : Modified
Published: 2017-10-20T15:29:00.427
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-6144
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD