Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61958: CWE-250: Execution with Unnecessary Privileges in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61958cvecve-2025-61958cwe-250
Published: Wed Oct 15 2025 (10/15/2025, 13:55:53 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell.  For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:04:57 UTC

Technical Analysis

CVE-2025-61958 is a vulnerability identified in the iHealth command of F5 BIG-IP devices that allows an authenticated attacker with at least resource administrator privileges to bypass the Traffic Management Shell (tmsh) restrictions and gain unauthorized access to a bash shell. The tmsh is a command-line interface used to manage BIG-IP configurations and is designed to restrict access to sensitive system functions. However, this vulnerability enables privilege escalation by circumventing these restrictions, effectively granting the attacker shell-level access. For BIG-IP systems operating in Appliance mode, this exploit can cross security boundaries, potentially allowing the attacker to execute commands outside the intended security context. The vulnerability affects multiple versions of BIG-IP, including 15.1.0, 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported and in use. The CVSS v3.1 base score of 8.7 indicates a high severity level, with attack vector being network-based (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and scope changed (S:C), impacting confidentiality and integrity severely (C:H/I:H) but not availability (A:N). No public exploits are known at this time, but the vulnerability's nature suggests it could be leveraged for significant unauthorized access and control over affected systems. The CWE-250 classification highlights that the root cause is execution with unnecessary privileges, a common issue in privilege escalation vulnerabilities. This flaw poses a critical risk to organizations relying on BIG-IP devices for load balancing, application delivery, and security functions, as it undermines the device's security model and could lead to further compromise within the network.

Potential Impact

The impact of CVE-2025-61958 on European organizations is substantial due to the widespread use of F5 BIG-IP devices in critical infrastructure, including financial institutions, telecommunications providers, government agencies, and large enterprises. Successful exploitation allows attackers with resource administrator access to escalate privileges and gain shell access, potentially leading to full system compromise. This can result in unauthorized data access, manipulation of network traffic, disruption of application delivery, and lateral movement within the network. For BIG-IP systems in Appliance mode, crossing security boundaries increases the risk of breaching segmented network zones, which are often used to protect sensitive data and critical services. The confidentiality and integrity of data handled by these devices are at high risk, which could lead to data breaches, regulatory non-compliance (e.g., GDPR), and reputational damage. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score and ease of exploitation given the required privileges underscore the urgency for mitigation. European organizations with complex network environments and strict compliance requirements face increased operational and legal risks if this vulnerability is exploited.

Mitigation Recommendations

1. Immediately review and restrict resource administrator privileges on BIG-IP devices to the minimum necessary personnel to reduce the attack surface. 2. Implement strict access controls and multi-factor authentication (MFA) for all administrative accounts to prevent unauthorized access. 3. Monitor system logs and shell access attempts for unusual activity indicative of privilege escalation or tmsh bypass attempts. 4. Segment BIG-IP management interfaces from general network access to limit exposure to potential attackers. 5. Apply vendor patches and updates as soon as they become available; maintain an active support contract with F5 to receive timely security updates. 6. Conduct regular security audits and penetration testing focused on BIG-IP devices to identify and remediate configuration weaknesses. 7. Employ network intrusion detection/prevention systems (IDS/IPS) to detect anomalous commands or shell access patterns. 8. Educate administrators on the risks of privilege misuse and enforce policies for secure management of BIG-IP devices. 9. For Appliance mode deployments, verify and reinforce security boundary configurations to prevent unauthorized cross-boundary access. 10. Maintain an incident response plan specifically addressing potential BIG-IP compromises to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:43.550Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99527d7577a180040ed

Added to database: 10/15/2025, 2:03:01 PM

Last enriched: 10/15/2025, 2:04:57 PM

Last updated: 10/15/2025, 4:55:51 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats