CVE-2025-36546
07.05.2025, 22:15
On an F5OS system, if the root user had previously configured the system to allow login via SSH key-based authentication, and then enabled Appliance Mode; access via SSH key-based authentication is still allowed. For an attacker to exploit this vulnerability they must obtain the root user's SSH private key. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.Enginsight
| Vendor | Product | Version |
|---|---|---|
| f5 | f5os-a | 1.5.1 ≤ 𝑥 < 1.5.3 |
| f5 | f5os-c | 1.6.0 ≤ 𝑥 ≤ 1.6.2 |
𝑥
= Vulnerable software versions