CVE-2025-46265

8.8 HIGH

📋 TL;DR

CVE-2025-46265 is an improper authorization vulnerability in F5OS where remotely authenticated users (via LDAP, RADIUS, or TACACS+) may be granted higher privilege roles than intended. This affects F5OS systems with external authentication configured. Systems running software versions that have reached End of Technical Support are not evaluated.

💻 Affected Systems

Products:
  • F5OS
Versions: Specific versions not provided in description; check F5 advisory for affected versions
Operating Systems: F5OS
Default Config Vulnerable: ✅ No
Notes: Only affects systems configured with external authentication (LDAP, RADIUS, TACACS+). Systems using local authentication only are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with valid external authentication credentials could gain administrative access to F5OS, allowing complete system compromise, configuration changes, traffic interception, or service disruption.

🟠

Likely Case

Authenticated users with standard privileges could escalate to administrative roles, enabling unauthorized configuration changes, policy modifications, or access to sensitive system data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential privilege escalation attempts that can be detected and blocked before causing damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid authentication credentials but minimal technical skill once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000139503 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000139503

Restart Required: Yes

Instructions:

1. Review F5 advisory K000139503. 2. Identify affected version. 3. Upgrade to fixed version per F5 documentation. 4. Restart affected services/systems.

🔧 Temporary Workarounds

Disable External Authentication

all

Temporarily switch to local authentication only to prevent exploitation via LDAP/RADIUS/TACACS+

Configure local authentication via F5OS CLI or GUI

Restrict External Authentication Sources

all

Limit which external authentication servers can be used and implement strict access controls

Configure ACLs on authentication servers and F5OS

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate F5OS systems from untrusted networks
  • Enhance monitoring of authentication logs and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if system uses LDAP/RADIUS/TACACS+ authentication and compare version against F5 advisory

Check Version:

show version (F5OS CLI)

Verify Fix Applied:

Verify upgraded to fixed version and test authentication with non-admin external credentials

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Authentication from external sources with elevated roles
  • Configuration changes by newly privileged users

Network Indicators:

  • Authentication traffic to F5OS from external sources
  • Unexpected administrative access patterns

SIEM Query:

source="f5os" AND (event_type="auth" OR event_type="privilege") AND result="success" AND user_role_change="true"

🔗 References

📤 Share & Export