First published: Wed May 07 2025(Updated: )
On an F5OS system, if the root user configures the system to allow login using SSH key-based authentication and later enables appliance mode, the system still allows access using SSH key-based authentication. For an attacker to exploit this vulnerability they must obtain possession of a private key corresponding to a previously-configured entry in root's SSH authorized_keys file.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS | >=1.5.1<=1.5.2 | 1.8.01.5.3 |
F5 F5OS | >=1.6.0<=1.6.2 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000140574 is classified as high due to the potential risk of unauthorized SSH access.
To fix F5-K000140574, disable SSH key-based authentication before enabling appliance mode on your F5OS system.
F5-K000140574 affects F5OS-A versions 1.5.1 to 1.5.2 and F5OS-C versions 1.6.0 to 1.6.2.
The potential impact of F5-K000140574 includes unauthorized access to the system if an attacker gains possession of the private SSH key.
A recommended workaround for F5-K000140574 is to refrain from using SSH key-based authentication when appliance mode is enabled.