A vulnerability exists in F5OS-A and F5OS-C system that may allow an authenticated attacker with local access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000156771 |
|
History
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-a:1.8.0:*:*:*:*:*:*:* cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:* |
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 f5os F5 f5os-a F5 f5os-c |
|
| Vendors & Products |
F5
F5 f5os F5 f5os-a F5 f5os-c |
Wed, 15 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in F5OS-A and F5OS-C system that may allow an authenticated attacker with local access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | F5OS Vulnerability | |
| Weaknesses | CWE-250 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published: 2025-10-15T15:19:50.430Z
Updated: 2025-10-16T03:56:23.881Z
Reserved: 2025-10-03T23:04:43.585Z
Link: CVE-2025-57780
Updated: 2025-10-15T20:43:34.619Z
Status : Analyzed
Published: 2025-10-15T16:15:34.877
Modified: 2025-10-21T19:20:56.093
Link: CVE-2025-57780
No data.