Impact
The vulnerability arises when a BIG‑IP system runs in Appliance mode. An authenticated attacker who holds the Administrator role can bypass the Appliance mode restrictions imposed on the system. This flaw is identified as CWE‑35, indicating an insecure direct object reference, and the CVSS score of 8.5 indicates a high severity impact. The potential consequence is that the attacker gains full administrative control over the BIG‑IP appliance, compromising confidentiality, integrity, and availability of network services managed by the device.
Affected Systems
The affected product is F5 BIG‑IP appliances configured to run in Appliance mode. Software versions that have reached End of Technical Support are not evaluated. No specific version numbers are listed, so any supported BIG‑IP operating under Appliance mode is potentially vulnerable.
Risk and Exploitability
Due to the high CVSS score, this flaw is considered high risk. The EPSS score is not available, so the current exploitation likelihood cannot be quantified, but the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation has not been reported yet. The attack vector is derived from the description: it is an authenticated privilege escalation, relying on the attacker already having Administrator credentials. If the attacker can obtain such credentials, the attacker can easily subvert Appliance mode and perform unrestricted administrative operations.
OpenCVE Enrichment