Логотип exploitDog
bind:CVE-2025-43878
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-43878

Количество 2

Количество 2

nvd логотип

CVE-2025-43878

9 месяцев назад

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-jv2x-vg3f-2535

9 месяцев назад

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-43878

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 6
0%
Низкий
9 месяцев назад
github логотип
GHSA-jv2x-vg3f-2535

When running in Appliance mode, an authenticated attacker assigned the Administrator or Resource Administrator role may be able to bypass Appliance mode restrictions utilizing system diagnostics tcpdump command utility on a F5OS-C/A system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 6
0%
Низкий
9 месяцев назад

Уязвимостей на страницу