CVE-2025-31644

CWE-77Command Injection5 documents5 sources
Severity
8.5HIGH
EPSS
0.6%
top 30.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateMay 13

Description

When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:L

Affected Packages22 packages

NVDf5/big-ip_domain_name_system15.1.015.1.10.7+2
NVDf5/big-ip_application_security_manager15.1.015.1.10.7+2
CVEListV5f5/big-ip17.1.017.1.2.2+2
NVDf5/big-ip_websafe15.1.015.1.10.7+2
NVDf5/big-ip_analytics15.1.015.1.10.7+2

🔴Vulnerability Details

2
GHSA
GHSA-2mq5-vgx2-cq4h: When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which ma2025-05-08
CVEList
Appliance mode BIG-IP iControl REST and tmsh vulnerability2025-05-07

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS F5 BIG-IP Authenticated Command Injection (CVE-2025-31644)2025-05-13

📋Vendor Advisories

1
F5
CVE-2025-31644: When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP T...2025-05-07
CVE-2025-31644 (HIGH CVSS 8.5) | When running in Appliance mode | cvebase.io