CVE-2025-20029

HIGH
2025-02-05 [email protected]
8.7
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
X

Lifecycle Timeline

2
Analysis Generated
Mar 28, 2026 - 18:25 vuln.today
CVE Published
Feb 05, 2025 - 18:15 nvd
HIGH 8.7

Description

Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Analysis

F5 BIG-IP contains an authenticated command injection in the iControl REST API and TMOS Shell (tmsh) save command. Authenticated attackers can inject system commands through crafted save operations, executing arbitrary code on the BIG-IP appliance which typically handles load balancing and SSL termination for critical application infrastructure.

Technical Context

The tmsh save command processes user-supplied parameters without adequate sanitization before passing them to underlying system commands. An authenticated user with access to iControl REST or tmsh can inject shell metacharacters that execute arbitrary commands. BIG-IP appliances run a modified Linux OS and the exploitation context provides access to TLS private keys, configuration secrets, and network traffic.

Affected Products

['F5 BIG-IP (multiple versions, EoTS versions not evaluated)']

Remediation

Apply the latest F5 security hotfix. Restrict iControl REST access to management networks only. Implement multi-factor authentication for BIG-IP admin access. Monitor tmsh command logs for unusual save operations. Rotate TLS certificates if compromise is suspected.

Priority Score

110
Low Medium High Critical
KEV: 0
EPSS: +66.2
CVSS: +44
POC: 0

Share

CVE-2025-20029 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy