When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
History

Thu, 08 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 22:15:00 +0000

Type Values Removed Values Added
Description When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title F5OS-A/C CLI vulnerability
Weaknesses CWE-1286
CWE-149
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published: 2025-05-07T22:04:08.402Z

Updated: 2025-05-08T13:00:05.372Z

Reserved: 2025-04-23T22:28:26.335Z

Link: CVE-2025-43878

cve-icon Vulnrichment

Updated: 2025-05-08T12:59:53.438Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-07T22:15:20.867

Modified: 2025-05-08T14:39:09.683

Link: CVE-2025-43878

cve-icon Redhat

No data.