CVE-2025-43878 – F5OS-C/A Appliance Mode Bypass Vulnerability

The following table lists the changes that have been made to the
CVE-2025-43878 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 07, 2025

    Action Type Old Value New Value
    Added Description When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system. 

    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
    Added CWE CWE-149
    Added CWE CWE-1286
    Added Reference https://my.f5.com/manage/s/article/K000139502
Share the Post:

Related Posts