CVE-2025-23239

high F5
CVSS v3 Base Score
8.7
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
EPSS Score
0.4%
Exploitation probability in 30 days
Top 37% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Confidentiality
High
Integrity
High
Availability
None
Published: February 5, 2025 (462 days ago)
Last Modified: February 4, 2026
Vendor: F5

Description

When running in Appliance mode, and logged into a highly-privileged role, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CWE

CWE-77

Affected Products

f5 big-ip access policy managerf5 big-ip advanced firewall managerf5 big-ip analyticsf5 big-ip application acceleration managerf5 big-ip application security managerf5 big-ip domain name systemf5 big-ip fraud protection servicef5 big-ip global traffic managerf5 big-ip link controllerf5 big-ip local traffic manager

References