First published: Wed May 07 2025(Updated: )
When running in appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-A/C system.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS | >=1.5.1<=1.5.3 | 1.8.0 |
F5 F5OS | >=1.6.0<=1.6.2 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-43878 is considered a high severity vulnerability due to the potential for administrative privilege escalation.
To mitigate CVE-2025-43878, upgrade to F5OS-A version 1.8.0 or later for affected F5OS-A systems, and F5OS-C version 1.8.0 or later for affected F5OS-C systems.
CVE-2025-43878 impacts systems running F5OS-A and F5OS-C versions 1.5.1 to 1.5.3 and 1.6.0 to 1.6.2 respectively.
An authenticated attacker assigned the Administrator role can utilize the tcpdump command to bypass Appliance mode restrictions.
CVE-2025-43878 is not remotely exploitable as it requires authentication and specific role assignments to exploit.