๐Ÿ” CVE Alert

CVE-2025-36546

HIGH 8.1

F5OS Appliance Mode vulnerability

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key.ย ย  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CWE CWE-863
Vendor f5
Product f5os - appliance
Published May 7, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for f5 f5os - appliance

Be the first to know when new high vulnerabilities affecting f5 f5os - appliance are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

F5 / F5OS - Appliance
1.7.0 < 1.8.0 1.5.1 < 1.5.3
F5 / F5OS - Chassis
1.6.0 < 1.8.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
my.f5.com: https://my.f5.com/manage/s/article/K000140574

Credits

F5