Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-6145 : What You Need to Know

Learn about CVE-2017-6145, a vulnerability in F5 BIG-IP products allowing expired cookies to be converted into valid tokens. Find mitigation steps and preventive measures here.

CVE-2017-6145 involves a cookie verification vulnerability in F5 BIG-IP products, potentially allowing expired cookies to be converted into valid tokens.

Understanding CVE-2017-6145

What is CVE-2017-6145?

The iControl REST feature in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, and WebSafe versions 12.0.0 through 12.1.2 and 13.0.0 has a flaw that fails to adequately re-validate cookies during the conversion process, enabling expired cookies to be converted into valid tokens.

The Impact of CVE-2017-6145

This vulnerability could potentially allow malicious actors to exploit expired cookies and gain unauthorized access to sensitive information or systems.

Technical Details of CVE-2017-6145

Vulnerability Description

The flaw in the iControl REST feature of F5 BIG-IP products allows expired cookies to be converted into valid tokens without proper re-validation.

Affected Systems and Versions

        Affected Products: F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM, WebSafe
        Affected Versions: 12.0.0 through 12.1.2, 13.0.0

Exploitation Mechanism

Malicious actors could exploit this vulnerability by converting expired cookies into valid tokens, potentially gaining unauthorized access.

Mitigation and Prevention

Immediate Steps to Take

        Apply patches provided by F5 Networks to address this vulnerability.
        Monitor network traffic for any suspicious activities related to cookie conversions.

Long-Term Security Practices

        Regularly update and patch F5 BIG-IP products to mitigate known vulnerabilities.
        Implement strong authentication mechanisms to reduce the risk of unauthorized access.

Patching and Updates

Ensure that all F5 BIG-IP products are updated with the latest patches and security fixes to prevent exploitation of this vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now