First published: Wed Feb 05 2025(Updated: )
A command injection vulnerability exists in iControl REST and the BIG-IP TMOS Shell (tmsh), which may allow an authenticated attacker to execute arbitrary system commands.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP | >=17.1.0<=17.1.2 | 17.1.2.1 |
F5 BIG-IP | >=16.1.0<=16.1.5 | 16.1.5.2 |
F5 BIG-IP | >=15.1.0<=15.1.10 | 15.1.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20029 is classified as a critical severity vulnerability due to its potential to allow authenticated attackers to execute arbitrary commands.
To fix CVE-2025-20029, F5 has released updated versions of BIG-IP that must be applied to the affected systems.
CVE-2025-20029 affects F5 BIG-IP versions 15.1.0 through 15.1.10, 16.1.0 through 16.1.5, and 17.1.0 through 17.1.2.
The exploitation of CVE-2025-20029 requires authentication, making it an issue that could potentially be targeted by internal attackers.
The systems vulnerable to CVE-2025-20029 include those running specific versions of F5 BIG-IP and its iControl REST and BIG-IP TMOS Shell.