CVE-2025-23239Command Injection in F5 Big-ip Application Security Manager

Severity
8.5HIGHNVD
EPSS
0.6%
top 29.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 5

Description

When running in Appliance mode, and logged into a highly-privileged role, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Packages12 packages

🔴Vulnerability Details

2
GHSA
GHSA-47pf-mc42-q29m: When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint2025-02-05
CVEList
BIG-IP iControl REST vulnerability2025-02-05

📋Vendor Advisories

2
F5
CVE-2025-23239: When running in Appliance mode, and logged into a highly-privileged role, an authenticated remote command injection v...2025-02-05
Microsoft
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled 2021-01-12
CVE-2025-23239 — Command Injection in F5 | cvebase