Description
When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system commands with higher privileges. In Appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Published: 2026-05-13
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw exists in the iControl REST and BIG‑IP TMOS Shell (tmsh) command that allows an authenticated user holding a Resource Administrator or Administrator role to run arbitrary system commands with elevated privileges. The vulnerability uses an undisclosed command path, permitting the attacker to execute code that could compromise the underlying operating system or network configuration. The potential impact includes full system compromise, data exfiltration, and alteration or destruction of the appliance state, as the attacker can achieve higher privileges than required for normal configuration tasks.

Affected Systems

F5 BIG‑IP appliances that have BIG‑IP DNS provisioned. The vulnerability specifically affects F5's BIG‑IP DNS and the broader BIG‑IP platform where iControl REST and tmsh interfaces are enabled. No specific software versions are listed; however, the issue is operative in all versions where the described components exist and are supported.

Risk and Exploitability

The CVSS score of 8.5 reflects a high severity vulnerability. Exploitation requires authenticated access with Administrative privileges, indicating that the attacker must already have legitimate credentials or penetration of internal systems. The EPSS score is not available, so the current likelihood cannot be quantified, but the absence from KEV suggests no publicly known exploits yet. An attacker that can reach the iControl REST or tmsh interface—typically through an internal network or via exposed management interfaces—can trigger this flaw to gain privileged system access and potentially cross security boundaries in Appliance mode deployments.

Generated by OpenCVE AI on May 13, 2026 at 16:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest F5 BIG‑IP patch that addresses the iControl REST and tmsh command injection flaw.
  • Restrict network access to the iControl REST and tmsh interfaces to trusted networks or administrators only, using firewall rules or VLAN segmentation.
  • Disable or uninstall BIG‑IP DNS if it is not required for your environment to eliminate the vulnerable component.

Generated by OpenCVE AI on May 13, 2026 at 16:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared F5
F5 big-ip
Vendors & Products F5
F5 big-ip

Wed, 13 May 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system commands with higher privileges. In Appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title iControl REST and tmsh vulnerability
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2026-05-14T03:56:23.162Z

Reserved: 2026-04-30T23:04:10.862Z

Link: CVE-2026-40061

cve-icon Vulnrichment

Updated: 2026-05-13T16:13:10.371Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-13T16:16:42.283

Modified: 2026-05-13T16:27:11.127

Link: CVE-2026-40061

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T17:15:26Z

Weaknesses