First published: Wed May 07 2025(Updated: )
On an F5OS system, if the root user configures the system to allow login using SSH key-based authentication and later enables appliance mode, the system still allows access using SSH key-based authentication. For an attacker to exploit this vulnerability they must obtain possession of a private key corresponding to a previously-configured entry in root's SSH authorized_keys file.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS | >=1.5.1<=1.5.2 | 1.8.01.5.3 |
F5 F5OS | >=1.6.0<=1.6.2 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-36546 is classified as a high-severity vulnerability due to the potential unauthorized SSH access it allows.
To mitigate CVE-2025-36546, disable SSH key-based authentication for root users when appliance mode is enabled.
CVE-2025-36546 affects F5 F5OS-A versions from 1.5.1 to 1.5.2 and F5 F5OS-C versions from 1.6.0 to 1.6.2.
If exploited, CVE-2025-36546 allows attackers with access to the private key to gain unauthorized SSH access to the F5OS system.
It is the responsibility of system administrators to implement the necessary configurations to mitigate CVE-2025-36546.