Back to Advisories
High Severity CVE-2025-61955

F5OS — Privilege Escalation via Eval Injection

An authenticated local attacker on an affected F5OS platform can abuse an improperly neutralized dynamic code-evaluation path to escalate privileges and cross security boundaries on the appliance.

CVSS v3.1
8.8
CVSS v4.0
8.5
Vector
Local
Weakness
CWE-95
Published
Oct 2025

Overview

F5OS is the management-plane operating system underpinning modern F5 platforms — F5OS-A (appliances) and F5OS-C (chassis / VELOS). This vulnerability lives in a code path that evaluates dynamically constructed expressions using attacker-influenced input without fully neutralizing it: the classic CWE-95 "Eval Injection" pattern.

The attacker must already have a valid local, authenticated foothold — but from there, they can slip crafted input into the evaluator and run with the privileges of the evaluating process, escalating on the management plane.

Affected Versions

F5OS-A
1.5.1 — 1.5.3  ·  1.8.0
F5OS-C
1.6.0 — 1.6.2  ·  1.8.0 — 1.8.1

Always verify the authoritative fixed-release matrix in F5's official advisory before planning an upgrade.

Technical Analysis

CWE-95 describes a bug class where an application passes partially-controlled data into a function that dynamically parses and executes it as code. When input sanitization is incomplete, the attacker breaks out of the data context and supplies instructions the interpreter then runs.

This is not pre-auth. The attacker needs a local authenticated foothold — a compromised operator account, a lateral-movement foothold from an adjacent tenant, or a previously established shell. The bar is real, but the outcome is significant: F5 appliances are often multi-tenant with multiple operator roles, so any cross-boundary escalation on the management plane is consequential.

Impact

Mitigation

Detection Ideas

References

Official F5 Advisory · K000156771 NIST NVD · CVE-2025-61955 MITRE CVE Record CWE-95 · Eval Injection

Personal analysis summarizing public information. Always verify affected versions and fixes against the official F5 advisory before acting.