CVE-2025-54809

7.4 HIGH

📋 TL;DR

F5 Access for Android before version 3.1.2 fails to verify remote endpoint identity during HTTPS connections, allowing man-in-the-middle attacks. This affects Android users running vulnerable versions of the F5 Access VPN client. Attackers could intercept and manipulate VPN traffic.

💻 Affected Systems

Products:
  • F5 Access for Android
Versions: All versions before 3.1.2
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version of F5 Access. iOS and desktop versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete interception of all VPN traffic, credential theft, session hijacking, and injection of malicious content into encrypted communications.

🟠

Likely Case

Man-in-the-middle attackers intercepting sensitive corporate data, credentials, or session tokens transmitted through the VPN connection.

🟢

If Mitigated

Limited impact if network controls prevent man-in-the-middle positioning or if traffic is additionally encrypted at application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires man-in-the-middle positioning between client and VPN endpoint. No authentication bypass needed once MITM is established.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.2

Vendor Advisory: https://my.f5.com/manage/s/article/K000152049

Restart Required: Yes

Instructions:

1. Open Google Play Store on Android device. 2. Search for 'F5 Access'. 3. Update to version 3.1.2 or later. 4. Restart the F5 Access application.

🔧 Temporary Workarounds

Disable vulnerable app

android

Temporarily disable or uninstall F5 Access until patched

Settings > Apps > F5 Access > Disable/Uninstall

Use alternative VPN client

all

Use F5 Access for iOS or desktop versions if available

🧯 If You Can't Patch

  • Restrict VPN access to trusted networks only (avoid public Wi-Fi)
  • Implement additional application-layer encryption for sensitive data

🔍 How to Verify

Check if Vulnerable:

Check F5 Access app version in Android Settings > Apps > F5 Access

Check Version:

Not applicable - check via Android UI

Verify Fix Applied:

Confirm version is 3.1.2 or higher in app settings

📡 Detection & Monitoring

Log Indicators:

  • Unexpected certificate warnings in client logs
  • Connection failures with certificate validation errors

Network Indicators:

  • Unusual MITM activity on VPN connection paths
  • SSL/TLS interception attempts

SIEM Query:

source="android_device" app="F5 Access" (event="certificate_error" OR event="ssl_handshake_failure")

🔗 References

📤 Share & Export