Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2025-43878

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.6%
CVSS Severity
CVSS v3 Score 6.0
Products affected by CVE-2025-43878
  • F5 » R10600 » Version: N/A
    cpe:2.3:h:f5:r10600:-
  • F5 » R10800 » Version: N/A
    cpe:2.3:h:f5:r10800:-
  • F5 » R10900 » Version: N/A
    cpe:2.3:h:f5:r10900:-
  • F5 » R12600-Ds » Version: N/A
    cpe:2.3:h:f5:r12600-ds:-
  • F5 » R12800-Ds » Version: N/A
    cpe:2.3:h:f5:r12800-ds:-
  • F5 » R12900-Ds » Version: N/A
    cpe:2.3:h:f5:r12900-ds:-
  • F5 » R5600 » Version: N/A
    cpe:2.3:h:f5:r5600:-
  • F5 » R5800 » Version: N/A
    cpe:2.3:h:f5:r5800:-
  • F5 » R5900 » Version: N/A
    cpe:2.3:h:f5:r5900:-
  • F5 » Velos Cx1610 » Version: N/A
    cpe:2.3:h:f5:velos_cx1610:-
  • F5 » Velos Cx410 » Version: N/A
    cpe:2.3:h:f5:velos_cx410:-
  • F5 » F5os-A » Version: 1.5.1
    cpe:2.3:o:f5:f5os-a:1.5.1
  • F5 » F5os-A » Version: 1.5.2
    cpe:2.3:o:f5:f5os-a:1.5.2
  • F5 » F5os-A » Version: 1.5.3
    cpe:2.3:o:f5:f5os-a:1.5.3
  • F5 » F5os-A » Version: 1.5.4
    cpe:2.3:o:f5:f5os-a:1.5.4
  • F5 » F5os-A » Version: 1.7.0
    cpe:2.3:o:f5:f5os-a:1.7.0
  • F5 » F5os-C » Version: 1.6.0
    cpe:2.3:o:f5:f5os-c:1.6.0
  • F5 » F5os-C » Version: 1.6.1
    cpe:2.3:o:f5:f5os-c:1.6.1
  • F5 » F5os-C » Version: 1.6.2
    cpe:2.3:o:f5:f5os-c:1.6.2


Contact Us

Shodan ® - All rights reserved