Impact
A vulnerability in BIG‑IP scripted monitors allows an authenticated attacker who holds the Resource Administrator or Administrator role to execute arbitrary system commands with higher privileges. When deployed in appliance mode, a successful exploitation can cross a security boundary, allowing the attacker to affect parts of the system that would normally be protected.
Affected Systems
The affected product is F5 BIG‑IP. No specific version information is provided in the advisory. Software that has reached End of Technical Support is not evaluated.
Risk and Exploitability
The CVSS score of 8.5 indicates a high severity risk. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires valid authentication with one of the privileged roles and is therefore limited to users who have been granted access to the BIG‑IP management interface. Once authenticated, the attacker can execute commands that may compromise the host operating system and potentially breach internal security controls.
OpenCVE Enrichment