A vulnerability exists in the iHealth command that may allow an authenticated attacker with at least a resource administrator role to bypass tmsh restrictions and gain access to a bash shell. For BIG-IP systems running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Published October 15, 2025.
F5 Big-ip Local Traffic Manager
F5 Big-ip Automation Toolchain
F5 Big-ip Advanced Web Application Firewall
F5 Big-ip Application Acceleration Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Ddos Hybrid Defender
F5 Big-ip Global Traffic Manager
F5 Big-ip Application Visibility And Reporting
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Container Ingress Services
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager