Impact
The vulnerability resides in an undisclosed configuration utility page of F5 BIG‑IP, allowing an attacker to fabricate error messages. This flaw, classified as CWE‑451, could cause administrators to be misled or to trust incorrect system states, potentially leading to incorrect troubleshooting or authorization decisions. The official description does not indicate that confidentiality, integrity, or availability are directly compromised, so the impact is limited to deceptive authentication of error states.
Affected Systems
All F5 BIG‑IP products that incorporate the exposed configuration utility page, including Advanced Web Application Firewall, Application Acceleration Manager, Analytics, and other listed variants, are potentially affected. No specific version ranges are provided, so all current releases should be reviewed for the presence of the vulnerable page.
Risk and Exploitability
The CVSS score reflects a low‑severity weakness; the EPSS probability is below 1 % and the flaw is not listed in the CISA KEV catalog. The likely attack vector is remote, via the web‑based configuration interface, and the attacker would need administrative or privileged credentials to reach the vulnerable page. Because the flaw only allows message spoofing, the overall risk is low, but it introduces a subtle avenue for deception that can be exploited in targeted environments.
OpenCVE Enrichment