CVE-2025-23239

8.7 HIGH

📋 TL;DR

An authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint when running in Appliance mode with a highly-privileged role. This allows attackers to execute arbitrary commands and cross security boundaries. Affected systems are F5 products running vulnerable versions in Appliance mode with privileged user access.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Specific versions not provided in CVE description; refer to vendor advisory for affected versions
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when running in Appliance mode with authenticated access to a highly-privileged role. Systems not in Appliance mode or without privileged user access are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands with high privileges, potentially gaining full control of the appliance and accessing sensitive data or pivoting to other systems.

🟠

Likely Case

Privileged authenticated attacker gains command execution on the appliance, enabling data exfiltration, configuration modification, or installation of persistent backdoors.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected appliance with no lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with high privileges. The specific endpoint is undisclosed, which may slow widespread exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to vendor advisory K000138757 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000138757

Restart Required: Yes

Instructions:

1. Review vendor advisory K000138757 for affected versions. 2. Upgrade to patched version specified in advisory. 3. Restart affected services or system as required. 4. Verify patch application.

🔧 Temporary Workarounds

Restrict Access to iControl REST

all

Limit network access to iControl REST endpoints to trusted administrative networks only

Configure firewall rules to restrict access to iControl REST port (typically 443)

Implement Least Privilege

all

Review and restrict highly-privileged role assignments to only necessary personnel

Audit user roles and remove unnecessary administrative privileges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected appliances from critical systems
  • Enable detailed logging and monitoring of iControl REST access and command execution

🔍 How to Verify

Check if Vulnerable:

Check if system is running in Appliance mode and review version against vendor advisory K000138757

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify system version matches patched version from vendor advisory and confirm Appliance mode configuration

📡 Detection & Monitoring

Log Indicators:

  • Unusual iControl REST endpoint access patterns
  • Unexpected command execution in system logs
  • Authentication attempts to privileged roles from unusual sources

Network Indicators:

  • Unusual traffic to iControl REST endpoints
  • Outbound connections from appliance to unexpected destinations

SIEM Query:

source="f5_bigip" AND (event_type="icontrol_rest_access" OR event_type="command_execution") AND user_role="admin"

🔗 References

📤 Share & Export