Home

Description

A vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with at least resource administrator role to execute arbitrary system commands with higher privileges.  A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

PUBLISHED Reserved 2025-10-06 | Published 2025-10-15 | Updated 2025-10-16 | Assigner f5




HIGH: 8.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Appliance Mode

HIGH: 8.5CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Non-Appliance Mode

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unknown

17.5.0 (custom) before 17.5.1.3
affected

17.1.0 (custom) before 17.1.3
affected

16.1.0 (custom) before 16.1.6.1
affected

15.1.0 (custom) before 15.1.10.8
affected

Credits

F5 finder

References

my.f5.com/manage/s/article/K000156642 vendor-advisory

cve.org (CVE-2025-59481)

nvd.nist.gov (CVE-2025-59481)

Download JSON