Impact
A configuration flaw in F5 BIG‑IP appliances allows IP‑based access restrictions for the httpd service to be bypassed for certain endpoints. An attacker can establish connections from IP addresses that should be blocked, potentially accessing internal services and obtaining sensitive configuration or operational information. The weakness is a classic access‑control issue, identified as CWE‑420.
Affected Systems
F5 BIG‑IP appliances are affected. No specific version range was documented, but all supported releases are potentially vulnerable until a vendor‑supplied update is released.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation data. Likely attackers would need network reach to the affected BIG‑IP device and could exploit the exposure by sending requests that bypass the intended IP restriction. The attack could be performed from an external or internal source depending on network topology. As no public exploit code is documented, risk assessment focuses on configuration error mitigation rather than active exploitation.
OpenCVE Enrichment