On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000140574 |
![]() ![]() |
History
Thu, 08 May 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 07 May 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
Title | F5OS Appliance Mode vulnerability | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: f5
Published: 2025-05-07T22:04:08.040Z
Updated: 2025-05-08T13:00:27.327Z
Reserved: 2025-04-23T22:28:26.330Z
Link: CVE-2025-36546

Updated: 2025-05-08T13:00:23.063Z

Status : Awaiting Analysis
Published: 2025-05-07T22:15:19.927
Modified: 2025-05-08T14:39:09.683
Link: CVE-2025-36546

No data.