F5 Networks BIG-IP Edge Client: session ID vulnerability (K06635145)

Medium Nessus Plugin ID 102732


A web client installed on the remote Windows host is affected by a session id disclosure vulnerability.


The version of the Big-IP Edge Client installed on the remote Windows host is in the range 7071.x through 7132.x. It is, therefore, affected by a flaw in the BIG-IP Edge Client that exposes the current session ID as part of the request URI when sending Keep-Alive requests over an SSL channel. This approach can lead to exploit vulnerabilities in man-in-the-middle (MITM) SSL terminating proxies, which log the complete URI in their logs.


Upgrade your Big-IP device to 13.0.0 and ensure that all clients reinstall their Edge clients from the upgraded device.

See Also



Plugin Details

Severity: Medium

ID: 102732

File Name: f5_bigip_edge_client_SOL6635145.nasl

Version: $Revision: 1.2 $

Type: local

Agent: windows

Family: Windows

Published: 2017/08/24

Modified: 2017/08/25

Dependencies: 102733

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:f5:big-ip_edge_gateway

Required KB Items: installed_sw/Big-IP Edge Gateway Client for Windows

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/07/17

Vulnerability Publication Date: 2017/07/28

Reference Information

OSVDB: 163152

IAVB: 2017-B-0109