Cyber Posture

CVE-2025-23239

HighRCE

Published: 05 February 2025

Published
05 February 2025
Modified
04 February 2026
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0064 70.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-23239 is a high-severity Command Injection (CWE-77) vulnerability in F5 Big-Ip Access Policy Manager. Its CVSS base score is 8.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 29.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the command injection vulnerability by requiring timely remediation through vendor patches as specified in the F5 security advisory.

prevent

Requires validation of inputs to the iControl REST endpoint, directly preventing command injection exploits (CWE-77).

prevent

Enforces least privilege to minimize accounts with the highly-privileged role required to authenticate and exploit the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Remote authenticated command injection in public-facing iControl REST endpoint directly enables exploitation of public-facing applications (T1190) and arbitrary command execution via Unix shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

When running in Appliance mode, and logged into a highly-privileged role, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which…

more

have reached End of Technical Support (EoTS) are not evaluated.

Deeper analysisAI

CVE-2025-23239 is an authenticated remote command injection vulnerability (CWE-77) affecting an undisclosed iControl REST endpoint in F5 BIG-IP systems when running in Appliance mode. It requires the attacker to be logged in with a highly-privileged role. The vulnerability has a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N), indicating high severity due to network accessibility, low attack complexity, required high privileges, no user interaction, changed scope, and high impacts to confidentiality and integrity.

An attacker with a highly-privileged account can exploit this remotely by sending malicious input to the vulnerable iControl REST endpoint, enabling command injection. Successful exploitation allows the attacker to cross a security boundary, potentially leading to unauthorized access, data exfiltration, or system modification within the affected F5 environment.

The F5 security advisory at https://my.f5.com/manage/s/article/K000138757 provides details on affected versions, patches, and mitigation steps. Note that software versions which have reached End of Technical Support (EoTS) are not evaluated for fixes.

Details

CWE(s)

Affected Products

f5
big-ip access policy manager
17.1.1
f5
big-ip advanced firewall manager
17.1.1
f5
big-ip analytics
17.1.1
f5
big-ip application acceleration manager
17.1.1
f5
big-ip application security manager
17.1.1
f5
big-ip domain name system
17.1.1
f5
big-ip fraud protection service
17.1.1
f5
big-ip global traffic manager
17.1.1
f5
big-ip link controller
17.1.1
f5
big-ip local traffic manager
17.1.1
+1 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-22846Same product: F5 Big-Ip Access Policy Manager
CVE-2025-20029Same product: F5 Big-Ip Access Policy Manager
CVE-2025-20058Same product: F5 Big-Ip Access Policy Manager
CVE-2025-21091Same product: F5 Big-Ip Access Policy Manager
CVE-2025-20045Same product: F5 Big-Ip Access Policy Manager
CVE-2025-24320Same product: F5 Big-Ip Access Policy Manager
CVE-2025-21087Same product: F5 Big-Ip Access Policy Manager
CVE-2025-24497Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-53521Same product: F5 Big-Ip Access Policy Manager
CVE-2025-24312Same product: F5 Big-Ip Advanced Firewall Manager

References