CVE-2017-0305
📋 TL;DR
CVE-2017-0305 is a critical vulnerability in F5 SSL Intercept iApp that allows unauthenticated remote attackers to modify BIG-IP system configurations, extract sensitive files, and potentially execute commands. This affects organizations using F5 SSL Intercept iApp version 1.5.0-1.5.7 with Explicit Proxy feature and SNAT Auto Map enabled for egress traffic.
💻 Affected Systems
- F5 SSL Intercept iApp
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote command execution, configuration modification, and sensitive data exfiltration leading to full network control.
Likely Case
Unauthorized configuration changes and extraction of sensitive system files, potentially leading to credential theft and lateral movement.
If Mitigated
Limited impact if proper network segmentation and access controls prevent exploitation attempts.
🎯 Exploit Status
Exploitation requires specific configuration but is straightforward once identified
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.8 or later
Vendor Advisory: https://support.f5.com/csp/article/K53244431
Restart Required: Yes
Instructions:
1. Upgrade to SSL Intercept iApp version 1.5.8 or later. 2. Apply the update through the F5 Configuration Utility. 3. Restart affected services. 4. Verify the update was successful.
🔧 Temporary Workarounds
Disable SNAT Auto Map
allRemove SNAT Auto Map configuration from Explicit Proxy deployments
tmsh modify ltm virtual <virtual_server_name> snat-type none
Network Segmentation
allRestrict access to SSL Intercept iApp management interfaces
🧯 If You Can't Patch
- Disable Explicit Proxy feature or remove SNAT Auto Map configuration
- Implement strict network access controls to limit exposure to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check iApp version and configuration: 1. Navigate to iApps > Application Services > SSL Intercept. 2. Verify version is between 1.5.0-1.5.7. 3. Check if Explicit Proxy with SNAT Auto Map is configured.
Check Version:
tmsh list sys application service <app_name> | grep version
Verify Fix Applied:
Verify iApp version is 1.5.8 or later and SNAT Auto Map is disabled or removed from Explicit Proxy configuration.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized configuration changes in /var/log/ltm
- Unexpected file access patterns
- Unusual SNAT or proxy traffic patterns
Network Indicators:
- Unexpected connections to SSL Intercept management interfaces
- Anomalous traffic to/from proxy services
SIEM Query:
source="F5_BIGIP" AND (event_type="configuration_change" OR event_type="file_access") AND user="unknown"