Home

Description

A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell.  For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

PUBLISHED Reserved 2025-10-03 | Published 2025-10-15 | Updated 2025-10-16 | Assigner f5




HIGH: 8.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Appliance Mode

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Non-Appliance Mode

HIGH: 8.5CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unknown

17.5.0 before 17.5.1.1
affected

17.1.0 before 17.1.3
affected

16.1.0 before 16.1.6.1
affected

15.1.0 before 15.1.10.8
affected

Credits

F5 acknowledges Australian Cyber Security Centre for bringing this issue to our attention and following the highest standards of coordinated disclosure. finder

References

my.f5.com/manage/s/article/K000154647 vendor-advisory

cve.org (CVE-2025-61958)

nvd.nist.gov (CVE-2025-61958)

Download JSON