First published: Wed May 07 2025(Updated: )
When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | 17.1.2.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | 16.1.6 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | 15.1.10.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000148591 is high due to its potential for command injection by authenticated attackers.
To fix F5-K000148591, upgrade to the recommended patched version of F5 BIG-IP or BIG-IQ as specified in the advisory.
F5-K000148591 affects F5 BIG-IP and BIG-IQ Centralized Management running specific vulnerable versions.
Only authenticated attackers with administrator role privileges can exploit F5-K000148591.
F5-K000148591 is a command injection vulnerability in the iControl REST and BIG-IP TMOS Shell.