CVE-2025-36546

On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link Resource
https://my.f5.com/manage/s/article/K000140574 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*

History

21 Oct 2025, 18:42

Type Values Removed Values Added
References () https://my.f5.com/manage/s/article/K000140574 - () https://my.f5.com/manage/s/article/K000140574 - Vendor Advisory
CPE cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*
cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*
First Time F5 f5os-c
F5
F5 f5os-a

08 May 2025, 14:39

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-07 22:15

Updated : 2025-10-21 18:42


NVD link : CVE-2025-36546

Mitre link : CVE-2025-36546

CVE.ORG link : CVE-2025-36546


JSON object : View

Products Affected

f5

  • f5os-a
  • f5os-c
CWE
CWE-863

Incorrect Authorization