CVE-2025-31644
F5 BIG-IP Virtual Edition (tier - best) vulnerability analysis and mitigation

Overview

When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary (NVD).

Technical details

The vulnerability is classified as a command injection vulnerability (CWE-77) affecting BIG-IP TMOS Shell and iControl REST interfaces when running in Appliance mode. The vulnerability has received a CVSS v4.0 Base Score of 8.5 (HIGH) with vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:L and CVSS v3.1 Base Score of 8.7 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N (NVD).

Impact

A successful exploitation of this vulnerability could allow an authenticated attacker with administrator privileges to execute arbitrary system commands and cross security boundaries. This could potentially lead to system compromise and unauthorized access to sensitive resources (NVD).

Mitigation and workarounds

Software versions which have reached End of Technical Support (EoTS) are not evaluated. Users should ensure their systems are updated to the latest supported version and follow security best practices (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management