Description
A vulnerability exists in BIG-IP systems that may allow an authenticated attacker with administrative access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary.

 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Published: 2026-05-13
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in F5 BIG‑IP systems allows an attacker who already has administrative credentials to gain higher privileges. The vulnerability can be leveraged to cross a security boundary, potentially enabling the attacker to access services or data normally protected from that administrative account. The impact includes elevated privileges that could compromise confidentiality, integrity, and availability of the affected systems, as confirmed by the CWE‑121 indicator of a stack-based buffer overflow weakness.

Affected Systems

The vulnerability applies to F5 BIG‑IP devices that are not in End of Technical Support. No specific version information is provided in the advisory, so all supported BIG‑IP releases should be checked for the patch. Software versions that have reached EoTS are not evaluated in this advisory.

Risk and Exploitability

The CVSS score of 7.1 marks the vulnerability as high risk. EPSS data is not available, and the issue is not listed in the CISA KEV catalog, suggesting that widespread exploitation is currently undocumented. However, the attack vector requires an authenticated administrative user, indicating that local or remote users with such access could exploit the flaw. The lack of an unprivileged user attack path reduces the overall immediacy, but the elevated privileges would grant the attacker significant damage potential.

Generated by OpenCVE AI on May 13, 2026 at 17:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Review the F5 advisory at https://my.f5.com/manage/s/article/K000158971 for vendor-specified patch or configuration guidance.
  • Update BIG‑IP firmware to the latest supported release and apply any F5 security patch that addresses this privilege escalation flaw.
  • Restrict administrative access to a minimum number of trusted accounts and enforce strong authentication mechanisms to mitigate the risk of an attacker acquiring the necessary credentials.

Generated by OpenCVE AI on May 13, 2026 at 17:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared F5
F5 big-ip
Vendors & Products F5
F5 big-ip

Wed, 13 May 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in BIG-IP systems that may allow an authenticated attacker with administrative access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title F5 BIG-IP Appliance Mode Vulnerability
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2026-05-14T03:56:24.244Z

Reserved: 2026-04-30T23:02:47.674Z

Link: CVE-2026-42919

cve-icon Vulnrichment

Updated: 2026-05-13T16:14:32.992Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-13T16:16:49.263

Modified: 2026-05-13T16:27:11.127

Link: CVE-2026-42919

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T17:30:06Z

Weaknesses