CVE-2025-23239
📋 TL;DR
An authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint when running in Appliance mode with a highly-privileged role. This allows attackers to execute arbitrary commands and cross security boundaries. Affected systems are F5 products running vulnerable versions in Appliance mode with privileged user access.
💻 Affected Systems
- F5 BIG-IP
📦 What is this software?
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary commands with high privileges, potentially gaining full control of the appliance and accessing sensitive data or pivoting to other systems.
Likely Case
Privileged authenticated attacker gains command execution on the appliance, enabling data exfiltration, configuration modification, or installation of persistent backdoors.
If Mitigated
With proper access controls and network segmentation, impact is limited to the affected appliance with no lateral movement to other systems.
🎯 Exploit Status
Exploitation requires authenticated access with high privileges. The specific endpoint is undisclosed, which may slow widespread exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to vendor advisory K000138757 for specific fixed versions
Vendor Advisory: https://my.f5.com/manage/s/article/K000138757
Restart Required: Yes
Instructions:
1. Review vendor advisory K000138757 for affected versions. 2. Upgrade to patched version specified in advisory. 3. Restart affected services or system as required. 4. Verify patch application.
🔧 Temporary Workarounds
Restrict Access to iControl REST
allLimit network access to iControl REST endpoints to trusted administrative networks only
Configure firewall rules to restrict access to iControl REST port (typically 443)
Implement Least Privilege
allReview and restrict highly-privileged role assignments to only necessary personnel
Audit user roles and remove unnecessary administrative privileges
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected appliances from critical systems
- Enable detailed logging and monitoring of iControl REST access and command execution
🔍 How to Verify
Check if Vulnerable:
Check if system is running in Appliance mode and review version against vendor advisory K000138757
Check Version:
tmsh show sys version
Verify Fix Applied:
Verify system version matches patched version from vendor advisory and confirm Appliance mode configuration
📡 Detection & Monitoring
Log Indicators:
- Unusual iControl REST endpoint access patterns
- Unexpected command execution in system logs
- Authentication attempts to privileged roles from unusual sources
Network Indicators:
- Unusual traffic to iControl REST endpoints
- Outbound connections from appliance to unexpected destinations
SIEM Query:
source="f5_bigip" AND (event_type="icontrol_rest_access" OR event_type="command_execution") AND user_role="admin"