F5Os A

3 CVEs product

Monthly

CVE-2025-46265 HIGH This Week

On F5OS, an improper authorization vulnerability exists where remotely authenticated users (LDAP, RADIUS, TACACS+) may be authorized with higher privilege F5OS roles. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass F5Os A F5Os C
NVD
CVSS 4.0
8.7
EPSS
0.4%
CVE-2025-43878 HIGH This Week

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics. Rated high severity (CVSS 8.3), this vulnerability is low attack complexity. No vendor patch available.

Authentication Bypass F5Os A F5Os C
NVD
CVSS 4.0
8.3
EPSS
0.1%
CVE-2025-36546 CRITICAL Act Now

On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is. Rated critical severity (CVSS 9.2), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Authentication Bypass F5Os A F5Os C
NVD
CVSS 4.0
9.2
EPSS
0.3%
CVE-2025-46265
EPSS 0% CVSS 8.7
HIGH This Week

On F5OS, an improper authorization vulnerability exists where remotely authenticated users (LDAP, RADIUS, TACACS+) may be authorized with higher privilege F5OS roles. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Authentication Bypass F5Os A F5Os C
NVD
CVE-2025-43878
EPSS 0% CVSS 8.3
HIGH This Week

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics. Rated high severity (CVSS 8.3), this vulnerability is low attack complexity. No vendor patch available.

Authentication Bypass F5Os A F5Os C
NVD
CVE-2025-36546
EPSS 0% CVSS 9.2
CRITICAL Act Now

On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is. Rated critical severity (CVSS 9.2), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.

Authentication Bypass F5Os A F5Os C
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy