CVE-2025-43878

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link Resource
https://my.f5.com/manage/s/article/K000139502 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*
OR cpe:2.3:h:f5:r10600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r10900:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12600-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12800-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r12900-ds:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5600:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5800:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:r5900:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx1610:-:*:*:*:*:*:*:*
cpe:2.3:h:f5:velos_cx410:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-05-07 22:15

Updated : 2025-11-07 16:54


NVD link : CVE-2025-43878

Mitre link : CVE-2025-43878

CVE.ORG link : CVE-2025-43878


JSON object : View

Products Affected

f5

  • f5os-c
  • r10900
  • velos_cx1610
  • f5os-a
  • r10600
  • r5900
  • r12800-ds
  • r12900-ds
  • r10800
  • r12600-ds
  • r5800
  • velos_cx410
  • r5600
CWE
CWE-149

Improper Neutralization of Quoting Syntax

CWE-1286

Improper Validation of Syntactic Correctness of Input