First published: Fri Apr 13 2018(Updated: )
X509 certificate verification was not correctly implemented in the IP Intelligence Subscription and IP Intelligence feed-list features, and thus the remote server's identity is not properly validated in F5 BIG-IP 12.0.0-12.1.2, 11.6.0-11.6.2, or 11.5.0-11.5.5.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Advanced Firewall Manager | >=11.5.1<=11.5.5 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.1<=11.6.2 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.2 | |
F5 Application Security Manager | >=11.5.1<=11.5.5 | |
F5 Application Security Manager | >=11.6.1<=11.6.2 | |
F5 Application Security Manager | >12.1.0<=12.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-6143 is classified as high due to improper validation of a remote server's identity.
To fix CVE-2017-6143, upgrade F5 BIG-IP to a version that is not within the affected ranges, specifically above versions 12.1.2, 11.6.2, or 11.5.5.
F5 BIG-IP versions 11.5.1 through 11.5.5, 11.6.1 through 11.6.2, and 12.1.0 through 12.1.2 are affected by CVE-2017-6143.
CVE-2017-6143 impacts the IP Intelligence Subscription and IP Intelligence feed-list features in F5 BIG-IP.
There is no documented workaround for CVE-2017-6143; updating to a non-affected version is recommended.