When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
History

Fri, 07 Nov 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared F5
F5 f5os-a
F5 f5os-c
F5 r10600
F5 r10800
F5 r10900
F5 r12600-ds
F5 r12800-ds
F5 r12900-ds
F5 r5600
F5 r5800
F5 r5900
F5 velos Cx1610
F5 velos Cx410
CPEs cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12600-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12800-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12900-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx1610:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx410:-:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*
Vendors & Products F5
F5 f5os-a
F5 f5os-c
F5 r10600
F5 r10800
F5 r10900
F5 r12600-ds
F5 r12800-ds
F5 r12900-ds
F5 r5600
F5 r5800
F5 r5900
F5 velos Cx1610
F5 velos Cx410

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00039}

epss

{'score': 0.00045}


Thu, 08 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 22:15:00 +0000

Type Values Removed Values Added
Description When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title F5OS-A/C CLI vulnerability
Weaknesses CWE-1286
CWE-149
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2025-05-08T13:00:05.372Z

Reserved: 2025-04-23T22:28:26.335Z

Link: CVE-2025-43878

cve-icon Vulnrichment

Updated: 2025-05-08T12:59:53.438Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-07T22:15:20.867

Modified: 2025-11-07T16:54:44.003

Link: CVE-2025-43878

cve-icon Redhat

No data.