8.5
CVE-2025-31644 - Appliance mode BIG-IP iControl REST and tmsh vulnerability
When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attackeโฆ
8.7
CVE-2025-35995 - BIG-IP PEM vulnerability
When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcatย command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.ย Note: Software versions which have reached End ofโฆ
8.7
CVE-2025-36525 - BIG-IP APM PingAccess Virtual Server Vulnerability
When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
8.7
CVE-2025-36504 - BIG-IP HTTP/2 vulnerability
When a BIG-IP HTTP/2 httprouter profile is configured on a virtual server, undisclosed responses can cause an increase in memory resource utilization.ย Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
8.7
CVE-2025-41414 - BIG-IP HTTP/2 vulnerability
When HTTP/2 client and server profile is configured on a virtual server, undisclosed requests can cause TMM to terminate.ย Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
8.7
CVE-2025-41433 - BIG-IP SIP ALG profile vulnerability
When a Session Initiation Protocol (SIP) message routing framework (MRF) application layer gateway (ALG) profile is configured on a Message Routing virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached Eโฆ
8.7
CVE-2025-46265 - F5OS vulnerability
On F5OS, an improper authorization vulnerability exists where remotely authenticated users (LDAP, RADIUS, TACACS+) may be authorized with higher privilege F5OS roles.ย Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
8.3
CVE-2025-43878 - F5OS-A/C CLI vulnerability
When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.ย Note: Software versions which have reached End of Techโฆ
9.2
CVE-2025-36546 - F5OS Appliance Mode vulnerability
On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH priโฆ
8.7
CVE-2025-36557 - BIG-IP HTTP vulnerability
When an HTTP profile with the Enforce RFC Compliance option is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.ย Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.