CVE-2025-36546: CWE-863 Incorrect Authorization in F5 F5OS - Appliance
On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-36546 is a high-severity vulnerability affecting F5OS Appliance versions 1.5.1 and 1.7.0. The issue stems from incorrect authorization controls (CWE-863) in the F5OS system when Appliance Mode is enabled. Specifically, if the root user had previously configured the system to allow SSH key-based authentication, enabling Appliance Mode does not disable this access method. Consequently, SSH key-based authentication remains active despite the expectation that Appliance Mode would restrict or alter authentication mechanisms. Exploitation requires an attacker to possess the root user's SSH private key, which is a significant barrier but not impossible if the key is compromised through other means (e.g., phishing, insider threat, or poor key management). The vulnerability impacts confidentiality, integrity, and availability, as unauthorized root-level access could allow an attacker to fully control the appliance, manipulate configurations, intercept or redirect traffic, or disrupt services. The CVSS 3.1 score of 8.1 reflects the network attack vector with high impact but high attack complexity and no privileges or user interaction required. No known exploits are currently reported in the wild, and no patches are listed yet, indicating that organizations must rely on mitigation strategies until official fixes are released. This vulnerability is particularly critical given the role of F5 appliances in managing and securing network traffic, including load balancing and application delivery, making them high-value targets for attackers aiming to compromise enterprise infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability could be severe. F5 appliances are widely used in enterprise and service provider networks across Europe to secure and optimize application delivery. Unauthorized root access via compromised SSH keys could lead to full appliance takeover, allowing attackers to intercept sensitive data, disrupt critical services, or pivot into internal networks. This could affect confidentiality of personal data protected under GDPR, potentially leading to regulatory penalties and reputational damage. The integrity of network traffic and availability of services could also be compromised, impacting business continuity and customer trust. Given the appliance's strategic role in network infrastructure, exploitation could facilitate broader cyber espionage or sabotage campaigns targeting European critical infrastructure, financial institutions, and government agencies. The lack of known exploits currently provides a window for proactive defense, but the high severity and potential for significant operational disruption necessitate urgent attention.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all F5OS appliances to identify if SSH key-based authentication for root is enabled and whether Appliance Mode is active. 2) Enforce strict SSH key management policies, including revoking and rotating root SSH keys, especially if there is any suspicion of compromise. 3) Temporarily disable SSH key-based authentication for root users on affected versions until patches are available, switching to more secure authentication methods such as multi-factor authentication or certificate-based access where supported. 4) Restrict network access to management interfaces of F5 appliances using network segmentation, firewall rules, and VPNs to limit exposure to potential attackers. 5) Monitor logs and network traffic for anomalous SSH login attempts or unusual appliance behavior indicative of exploitation attempts. 6) Engage with F5 support and subscribe to security advisories to promptly apply patches once released. 7) Consider deploying compensating controls such as host-based intrusion detection systems (HIDS) on appliances to detect unauthorized access. These steps go beyond generic advice by focusing on root SSH key management and appliance-specific access controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36546: CWE-863 Incorrect Authorization in F5 F5OS - Appliance
Description
On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-36546 is a high-severity vulnerability affecting F5OS Appliance versions 1.5.1 and 1.7.0. The issue stems from incorrect authorization controls (CWE-863) in the F5OS system when Appliance Mode is enabled. Specifically, if the root user had previously configured the system to allow SSH key-based authentication, enabling Appliance Mode does not disable this access method. Consequently, SSH key-based authentication remains active despite the expectation that Appliance Mode would restrict or alter authentication mechanisms. Exploitation requires an attacker to possess the root user's SSH private key, which is a significant barrier but not impossible if the key is compromised through other means (e.g., phishing, insider threat, or poor key management). The vulnerability impacts confidentiality, integrity, and availability, as unauthorized root-level access could allow an attacker to fully control the appliance, manipulate configurations, intercept or redirect traffic, or disrupt services. The CVSS 3.1 score of 8.1 reflects the network attack vector with high impact but high attack complexity and no privileges or user interaction required. No known exploits are currently reported in the wild, and no patches are listed yet, indicating that organizations must rely on mitigation strategies until official fixes are released. This vulnerability is particularly critical given the role of F5 appliances in managing and securing network traffic, including load balancing and application delivery, making them high-value targets for attackers aiming to compromise enterprise infrastructure.
Potential Impact
For European organizations, the impact of this vulnerability could be severe. F5 appliances are widely used in enterprise and service provider networks across Europe to secure and optimize application delivery. Unauthorized root access via compromised SSH keys could lead to full appliance takeover, allowing attackers to intercept sensitive data, disrupt critical services, or pivot into internal networks. This could affect confidentiality of personal data protected under GDPR, potentially leading to regulatory penalties and reputational damage. The integrity of network traffic and availability of services could also be compromised, impacting business continuity and customer trust. Given the appliance's strategic role in network infrastructure, exploitation could facilitate broader cyber espionage or sabotage campaigns targeting European critical infrastructure, financial institutions, and government agencies. The lack of known exploits currently provides a window for proactive defense, but the high severity and potential for significant operational disruption necessitate urgent attention.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all F5OS appliances to identify if SSH key-based authentication for root is enabled and whether Appliance Mode is active. 2) Enforce strict SSH key management policies, including revoking and rotating root SSH keys, especially if there is any suspicion of compromise. 3) Temporarily disable SSH key-based authentication for root users on affected versions until patches are available, switching to more secure authentication methods such as multi-factor authentication or certificate-based access where supported. 4) Restrict network access to management interfaces of F5 appliances using network segmentation, firewall rules, and VPNs to limit exposure to potential attackers. 5) Monitor logs and network traffic for anomalous SSH login attempts or unusual appliance behavior indicative of exploitation attempts. 6) Engage with F5 support and subscribe to security advisories to promptly apply patches once released. 7) Consider deploying compensating controls such as host-based intrusion detection systems (HIDS) on appliances to detect unauthorized access. These steps go beyond generic advice by focusing on root SSH key management and appliance-specific access controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-04-23T22:28:26.330Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd86ec
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 7:25:07 AM
Last updated: 8/12/2025, 8:17:02 AM
Views: 14
Related Threats
CVE-2025-55283: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aiven aiven-db-migrate
CriticalCVE-2025-55282: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aiven aiven-db-migrate
CriticalCVE-2025-54234: Server-Side Request Forgery (SSRF) (CWE-918) in Adobe ColdFusion
LowCVE-2025-3639: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Liferay Portal
LowCVE-2025-55288: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MGeurts genealogy
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.