Impact
A flaw in a BIG‑IP TMOS Shell (tmsh) command allows an authenticated attacker who holds a resource administrator or administrator role to run arbitrary system commands with higher privileges. The vulnerability is a missing authorization issue (CWE‑732). If successfully exploited in appliance mode deployments, the attacker can cross a security boundary, potentially gaining full control of the device and its traffic handling capabilities.
Affected Systems
The affected product is F5 Networks BIG‑IP. No specific version information is provided in the CVE. Software versions that have reached End of Technical Support have not been evaluated and therefore are not considered affected in this assessment.
Risk and Exploitability
The CVSS score is 8.3, indicating high severity. EPSS is not available, and the vulnerability is not listed in CISA KEV. The attack requires authenticated access as a resource administrator or administrator; no public exploit code has been disclosed. Once the vulnerability is exploited, the attacker can execute arbitrary system commands with elevated privileges, causing confidentiality, integrity, and availability impacts on the BIG‑IP appliance and potentially on the networks it protects.
OpenCVE Enrichment