First published: Thu Apr 06 2017(Updated: )
F5 SSL Intercept iApp version 1.5.0 - 1.5.7 is vulnerable to an unauthenticated, remote attack that may allow modification of the BIG-IP system configuration, extraction of sensitive system files, and possible remote command execution on the system when deployed using the Explicit Proxy feature plus SNAT Auto Map option for egress traffic.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 SSL Intercept iApp | =1.5.0 | |
F5 SSL Intercept iApp | =1.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0305 has been assigned a severity level that indicates a high risk due to potential remote exploitation and critical system impact.
To fix CVE-2017-0305, upgrade the F5 SSL Intercept iApp to a version above 1.5.7 where the vulnerability is patched.
CVE-2017-0305 affects F5 SSL Intercept iApp versions 1.5.0 through 1.5.7.
CVE-2017-0305 can enable unauthenticated remote attacks that may allow modification of configurations, extraction of sensitive files, and remote command execution.
No, CVE-2017-0305 can be exploited without authentication.