F5OS-A and F5OS-C Privilege Escalation (CVE-2025-61955): Brief Summary and Technical Review

This post provides a brief summary and technical review of CVE-2025-61955, a high-severity privilege escalation vulnerability in F5OS-A and F5OS-C. We cover the technical mechanism, affected versions, and vendor security history based on available public information.
CVE Analysis

8 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-10-15

F5OS-A and F5OS-C Privilege Escalation (CVE-2025-61955): Brief Summary and Technical Review
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Privilege escalation on F5OS-A and F5OS-C can undermine the isolation and trust boundaries that enterprise and service provider networks depend on. CVE-2025-61955, disclosed in October 2025, allows authenticated attackers with local access to bypass Appliance mode and gain elevated privileges, directly impacting the security posture of organizations using F5's next-generation platforms.

About F5 Networks and F5OS: F5 Networks is a major vendor in the application delivery and network security space, with its BIG-IP and F5OS platforms deployed in thousands of enterprise and service provider environments worldwide. F5OS-A powers rSeries appliances, while F5OS-C is the foundation for VELOS chassis systems. These platforms are critical for high-performance, multi-tenant, and virtualized network services.

Technical Information

CVE-2025-61955 is a privilege escalation vulnerability in the F5OS-A and F5OS-C operating systems. The vulnerability allows an authenticated user with local access to escalate their privileges and cross security boundaries, including bypassing the restrictions imposed by Appliance mode.

  • Root Cause: The vulnerability is classified under CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code, also known as eval injection). This occurs when user-supplied input is processed by code evaluation functions (such as eval) without sufficient sanitization or validation. Attackers can inject malicious directives that are executed with elevated privileges.
  • Attack Vector: Local authenticated access is required. Attack complexity is low once access is obtained. The vulnerability is not remotely exploitable without prior credential compromise or local access.
  • Scope: Successful exploitation allows attackers to cross security boundaries within F5OS, including Appliance mode, which is intended to restrict privileged operations.
  • CVSS Details:
    • CVSS v3.1 Base Score: 8.8 (High) for Appliance mode
    • Vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

No public code snippets, PoC, or exploit scripts are available as of this writing. The vulnerability is only present in supported versions; End of Technical Support (EoTS) versions are not evaluated by F5.

Affected Systems and Versions

  • Products: F5OS-A (for rSeries appliances) and F5OS-C (for VELOS chassis)
  • Version Information:
    • The vulnerability is present in supported versions of F5OS-A and F5OS-C. Specific version numbers are not listed in the public advisory, but the October 2025 Quarterly Security Notification and F5 article K000156771 provide the authoritative list of affected and fixed versions.
    • End of Technical Support (EoTS) versions are not evaluated and may or may not be vulnerable.
  • Configuration:
    • Both standard and Appliance mode configurations are affected. The CVSS score is higher for Appliance mode due to the security boundary bypass.

Vendor Security History

F5 Networks has disclosed several privilege escalation and Appliance mode bypass vulnerabilities in 2025, including CVE-2025-61955, CVE-2025-57780, and CVE-2025-61958. The company experienced a major breach by nation-state actors in 2025, resulting in the theft of source code and vulnerability data. F5 typically releases quarterly security notifications and has a history of timely patch releases, but the recent breach has prompted increased scrutiny and emergency directives from CISA for federal agencies.

References

Detect & fix
what others miss