First published: Wed Feb 05 2025(Updated: )
When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23239 has a high severity rating due to its potential to enable remote command injection from authenticated users.
To fix CVE-2025-23239, update to the latest version of F5 BIG-IP that includes security patches addressing this vulnerability.
The potential impacts of CVE-2025-23239 include unauthorized access to system commands and the ability to cross security boundaries.
CVE-2025-23239 affects users of F5 BIG-IP running in Appliance mode with an exposed iControl REST endpoint.
Currently, F5 has not provided specific workarounds for CVE-2025-23239, making it essential to apply the necessary updates as soon as possible.