CVE-2025-36546
F5OS Appliance Mode vulnerability
CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th
On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key.ย ย Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| CWE | CWE-863 |
| Vendor | f5 |
| Product | f5os - appliance |
| Published | May 7, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for f5 f5os - appliance
Be the first to know when new high vulnerabilities affecting f5 f5os - appliance are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
F5 / F5OS - Appliance
1.7.0 < 1.8.0 1.5.1 < 1.5.3
F5 / F5OS - Chassis
1.6.0 < 1.8.0
References
Credits
F5