9.1
CVE-2025-23239
- EPSS 0.43%
- Veröffentlicht 05.02.2025 18:15:31
- Zuletzt bearbeitet 06.08.2025 16:23:09
- Quelle f5sirt@f5.com
- Teams Watchlist Login
- Unerledigt Login
When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5 ≫ Big-ip Access Policy Manager Version17.1.1
F5 ≫ Big-ip Advanced Firewall Manager Version17.1.1
F5 ≫ Big-ip Analytics Version17.1.1
F5 ≫ Big-ip Application Acceleration Manager Version17.1.1
F5 ≫ Big-ip Application Security Manager Version17.1.1
F5 ≫ Big-ip Domain Name System Version17.1.1
F5 ≫ Big-ip Fraud Protection Service Version17.1.1
F5 ≫ Big-ip Global Traffic Manager Version17.1.1
F5 ≫ Big-ip Link Controller Version17.1.1
F5 ≫ Big-ip Local Traffic Manager Version17.1.1
F5 ≫ Big-ip Policy Enforcement Manager Version17.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.43% | 0.615 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.1 | 2.3 | 6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
|
f5sirt@f5.com | 8.5 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
f5sirt@f5.com | 8.7 | 2.3 | 5.8 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.