First published: Wed May 07 2025(Updated: )
When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | 17.1.2.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | 16.1.6 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | 15.1.10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31644 has a high severity rating due to the potential for command injection by an authenticated attacker.
To fix CVE-2025-31644, upgrade to the recommended versions of F5 BIG-IP and BIG-IQ Centralized Management as specified in the advisory.
CVE-2025-31644 affects users of F5 BIG-IP versions 15.1.0 through 15.1.10, 16.1.0 through 16.1.6, and 17.1.0 through 17.1.2.2.
CVE-2025-31644 can facilitate arbitrary command execution in the system, leading to potential complete system compromise.
An authenticated attacker with administrator privileges can exploit CVE-2025-31644 to execute arbitrary system commands in Appliance mode.