On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
| Link | Resource |
|---|---|
| https://my.f5.com/manage/s/article/K000140574 | Vendor Advisory |
Configurations
History
21 Oct 2025, 18:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://my.f5.com/manage/s/article/K000140574 - Vendor Advisory | |
| CPE | cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:* |
|
| First Time |
F5 f5os-c
F5 F5 f5os-a |
08 May 2025, 14:39
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-07 22:15
Updated : 2025-10-21 18:42
NVD link : CVE-2025-36546
Mitre link : CVE-2025-36546
CVE.ORG link : CVE-2025-36546
JSON object : View
Products Affected
f5
- f5os-a
- f5os-c
CWE
CWE-863
Incorrect Authorization
