First published: Mon Dec 02 2024(Updated: )
An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 APM Clients | >=7.2.3<=7.2.5 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000148689 is considered critical due to the potential for unencrypted connections despite HSTS protections.
To fix F5-K000148689, upgrade the affected software to a version that is not vulnerable, such as those specified in the advisory.
F5-K000148689 affects specific versions of F5 BIG-IP, APM Clients, and Traffix SDC as detailed in the advisory.
Yes, F5-K000148689 can potentially allow attackers to intercept sensitive information due to the establishment of unencrypted connections.
Currently, the recommended approach for F5-K000148689 is to apply the available software updates rather than relying on workarounds.