CVE-2025-36546Incorrect Authorization in F5 F5os Appliance

Severity
9.2CRITICALNVD
EPSS
0.3%
top 50.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateMay 8

Description

On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5f5/f5os_appliance1.7.01.8.0+1
NVDf5/f5os-a1.5.11.5.3
CVEListV5f5/f5os_chassis1.6.01.8.0
NVDf5/f5os-c1.6.01.6.2

🔴Vulnerability Details

2
GHSA
GHSA-58w9-v93f-h76h: On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance M2025-05-08
CVEList
F5OS Appliance Mode vulnerability2025-05-07

📋Vendor Advisories

1
F5
CVE-2025-36546: On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authenticat...2025-05-07
CVE-2025-36546 — Incorrect Authorization in F5 | cvebase