First published: Wed May 07 2025(Updated: )
When running in appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-A/C system.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS | >=1.5.1<=1.5.3 | 1.8.0 |
F5 F5OS | >=1.6.0<=1.6.2 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000139502 is classified as High due to the risk of unauthorized access and potential system compromise.
To fix F5-K000139502, ensure that all users with Administrator or Resource Administrator privileges are reviewed and limit their access accordingly.
F5-K000139502 affects authenticated users with Administrator or Resource Administrator roles on F5OS-A and F5OS-C systems.
F5-K000139502 impacts F5OS-A versions from 1.5.1 to 1.5.3 and F5OS-C versions from 1.6.0 to 1.6.2.
F5-K000139502 allows an authenticated attacker to bypass Appliance mode restrictions by leveraging the tcpdump command utility in F5OS.