CVE-2025-43878

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link Resource
https://my.f5.com/manage/s/article/K000139502 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*
OR cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12600-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12800-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12900-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx1610:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx410:-:*:*:*:*:*:*:*

History

07 Nov 2025, 16:54

Type Values Removed Values Added
CPE cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12600-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx410:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx1610:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12900-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12800-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*
First Time F5
F5 r5600
F5 velos Cx410
F5 r10600
F5 r12800-ds
F5 f5os-c
F5 r5900
F5 r5800
F5 r10800
F5 f5os-a
F5 r12900-ds
F5 velos Cx1610
F5 r12600-ds
F5 r10900
References () https://my.f5.com/manage/s/article/K000139502 - () https://my.f5.com/manage/s/article/K000139502 - Vendor Advisory

08 May 2025, 14:39

Type Values Removed Values Added
Summary
  • (es) Al ejecutarse en modo Dispositivo, un atacante autenticado con el rol de Administrador o Administrador de Recursos podría eludir las restricciones del modo Dispositivo mediante la utilidad de diagnóstico del sistema tcpdump en un sistema F5OS-C/A. Nota: Las versiones de software que han alcanzado el fin del soporte técnico (EoTS) no se evalúan.

07 May 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-07 22:15

Updated : 2025-11-07 16:54


NVD link : CVE-2025-43878

Mitre link : CVE-2025-43878

CVE.ORG link : CVE-2025-43878


JSON object : View

Products Affected

f5

  • velos_cx410
  • r12900-ds
  • f5os-a
  • f5os-c
  • r10900
  • r5800
  • velos_cx1610
  • r12600-ds
  • r10600
  • r12800-ds
  • r5900
  • r5600
  • r10800
CWE
CWE-149

Improper Neutralization of Quoting Syntax

CWE-1286

Improper Validation of Syntactic Correctness of Input