When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000138757 |
![]() ![]() |
History
Wed, 06 Aug 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5 big-ip Access Policy Manager
F5 big-ip Advanced Firewall Manager F5 big-ip Analytics F5 big-ip Application Acceleration Manager F5 big-ip Application Security Manager F5 big-ip Domain Name System F5 big-ip Fraud Protection Service F5 big-ip Global Traffic Manager F5 big-ip Link Controller F5 big-ip Local Traffic Manager F5 big-ip Policy Enforcement Manager |
|
CPEs | cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_analytics:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_security_manager:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_domain_name_system:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_link_controller:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.1:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.1:*:*:*:*:*:*:* |
|
Vendors & Products |
F5 big-ip Access Policy Manager
F5 big-ip Advanced Firewall Manager F5 big-ip Analytics F5 big-ip Application Acceleration Manager F5 big-ip Application Security Manager F5 big-ip Domain Name System F5 big-ip Fraud Protection Service F5 big-ip Global Traffic Manager F5 big-ip Link Controller F5 big-ip Local Traffic Manager F5 big-ip Policy Enforcement Manager |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Wed, 05 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 05 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
Title | BIG-IP iControl REST vulnerability | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: f5
Published: 2025-02-05T17:31:03.286Z
Updated: 2025-02-06T04:55:24.286Z
Reserved: 2025-01-22T00:16:50.328Z
Link: CVE-2025-23239

Updated: 2025-02-05T18:16:06.471Z

Status : Analyzed
Published: 2025-02-05T18:15:31.373
Modified: 2025-08-06T16:23:09.107
Link: CVE-2025-23239

No data.