CVE-2025-61958
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
15/10/2025
Last modified:
04/02/2026
Description
A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell. For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Impact
Base Score 4.0
8.50
Severity 4.0
HIGH
Base Score 3.x
8.70
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* | 15.1.0 (including) | 15.1.10.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



