SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   F5 BIG-IP Vendors:   F5 Networks
F5 BIG-IP Advanced Firewall Manager Certificate Validation Flaw Lets Remote Users That Can Conduct a Man-in-the-Middle Attack Access and Modify IP Intelligence Policy Data Communicated By the Target System
SecurityTracker Alert ID:  1040255
SecurityTracker URL:  http://securitytracker.com/id/1040255
CVE Reference:   CVE-2017-6142   (Links to External Site)
Date:  Jan 20 2018
Impact:   Disclosure of system information, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in F5 BIG-IP Advanced Firewall Manager (AFM). A remote user can access and modify data communicated by the target system.

The early access 'user id' feature does not properly validate the remote server's X.509 certificate. A remote user that can conduct a man-in-the-middle attack can access and modify IP Intelligence (IPI) policy enforcement data communicated between the remote server and the target Advanced Firewall Manager.

The vendor has assigned ID 627747 to this vulnerability.

Impact:   A remote user that can conduct a man-in-the-middle attack can access and modify IPI policy data communicated by the target system.
Solution:   F5 has issued a fix (AFM 11.6.3, 12.1.2 HF1, 12.1.3, 13.0.0 HF1, 13.1.0).

The F5 advisory is available at:

https://support.f5.com/csp/#/article/K20682450

Vendor URL:  support.f5.com/csp/article/K20682450 (Links to External Site)
Cause:   Authentication error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC