Home

Description

A vulnerability exists in F5OS-A and F5OS-C systems that may allow an authenticated attacker with local access to escalate their privileges.  A successful exploit may allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

PUBLISHED Reserved 2025-10-03 | Published 2025-10-15 | Updated 2025-10-16 | Assigner f5




HIGH: 8.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Appliance Mode

HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Non-Appliance Mode

Problem types

CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code

Product status

Default status
unknown

1.8.0 before 1.8.3
affected

1.5.0 before 1.5.4
affected

Default status
unknown

1.8.0 before 1.8.2
affected

1.6.0 before 1.6.4
affected

Credits

F5 finder

References

my.f5.com/manage/s/article/K000156771 vendor-advisory

cve.org (CVE-2025-61955)

nvd.nist.gov (CVE-2025-61955)

Download JSON