CVE-2025-20029
Published: 05 February 2025
Summary
CVE-2025-20029 is a high-severity OS Command Injection (CWE-78) vulnerability in F5 Big-Ip Access Policy Manager. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the command injection vulnerability by requiring timely identification, reporting, and patching of the specific flaw in iControl REST and tmsh save command as per the F5 advisory.
Prevents command injection (CWE-78) by enforcing input validation mechanisms at the iControl REST and tmsh interfaces to reject malformed or malicious inputs.
Limits the impact of arbitrary command execution by ensuring authenticated low-privilege users and affected processes operate with least privilege on the BIG-IP system.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in public iControl REST/tmsh interface directly enables remote arbitrary command execution (T1190 + T1059.004) from low-privileged auth, resulting in full system compromise (T1068).
NVD Description
Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Deeper analysisAI
CVE-2025-20029 is a command injection vulnerability (CWE-78) present in the iControl REST interface and the BIG-IP TMOS Shell (tmsh) save command of F5 BIG-IP systems. Published on 2025-02-05, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its potential for significant impact. Software versions that have reached End of Technical Support (EoTS) are not evaluated for this issue.
An authenticated attacker with low privileges (PR:L) can exploit the vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation enables the execution of arbitrary system commands on the affected BIG-IP system, granting high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H).
Mitigation details, including available patches, are outlined in the F5 security advisory at https://my.f5.com/manage/s/article/K000148587.
Details
- CWE(s)