First published: Wed Feb 05 2025(Updated: )
A missing integrity check vulnerability exists in BIG-IP APM access policy endpoint inspection that may allow an attacker to bypass endpoint inspection checks for VPN connections initiated through the BIG-IP APM browser network access VPN client for Windows, macOS, and Linux.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Access Policy Manager | >=17.1.0<=17.1.1 | 17.1.2 |
F5 BIG-IP Access Policy Manager | >=16.1.0<=16.1.4 | 16.1.5 |
F5 BIG-IP Access Policy Manager | >=15.1.0<=15.1.10 | - |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-23415 is critical due to the potential for attackers to bypass important endpoint inspection checks.
To fix CVE-2025-23415, upgrade F5 BIG-IP (APM) to versions 17.1.2, 16.1.5, or ensure you are using a version that is not vulnerable.
CVE-2025-23415 affects F5 BIG-IP (APM) versions from 17.1.0 to 17.1.1, 16.1.0 to 16.1.4, and 15.1.0 to 15.1.10.
CVE-2025-23415 is classified as a missing integrity check vulnerability.
Exploiting CVE-2025-23415 may allow an attacker to bypass endpoint inspection, compromising the security of VPN connections.