Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-13943 | When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000139502 |
|
Fri, 07 Nov 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 f5os-a F5 f5os-c F5 r10600 F5 r10800 F5 r10900 F5 r12600-ds F5 r12800-ds F5 r12900-ds F5 r5600 F5 r5800 F5 r5900 F5 velos Cx1610 F5 velos Cx410 |
|
| CPEs | cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r12600-ds:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r12800-ds:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r12900-ds:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:* cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:* cpe:2.3:h:f5:velos_cx1610:-:*:*:*:*:*:*:* cpe:2.3:h:f5:velos_cx410:-:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
F5
F5 f5os-a F5 f5os-c F5 r10600 F5 r10800 F5 r10900 F5 r12600-ds F5 r12800-ds F5 r12900-ds F5 r5600 F5 r5800 F5 r5900 F5 velos Cx1610 F5 velos Cx410 |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 May 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | F5OS-A/C CLI vulnerability | |
| Weaknesses | CWE-1286 CWE-149 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2026-02-26T18:28:43.890Z
Reserved: 2025-04-23T22:28:26.335Z
Link: CVE-2025-43878
Updated: 2025-05-08T12:59:53.438Z
Status : Analyzed
Published: 2025-05-07T22:15:20.867
Modified: 2025-11-07T16:54:44.003
Link: CVE-2025-43878
No data.
OpenCVE Enrichment
No data.
EUVD