CVE-2025-35995: CWE-125 Out-of-bounds Read in F5 BIG-IP
When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcat command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-35995 is a high-severity vulnerability affecting F5 BIG-IP systems, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability arises from an out-of-bounds read (CWE-125) in the Traffic Management Microkernel (TMM) component when the BIG-IP PEM system is licensed with URL categorization enabled. This condition is triggered if a URL categorization policy or an iRule using the 'urlcat' command is active on a virtual server. Under these circumstances, specially crafted or undisclosed requests can cause the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but directly affects availability by causing service disruption. The CVSS v3.1 base score is 7.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are currently reported in the wild, and software versions that have reached End of Technical Support (EoTS) are not evaluated for this vulnerability. The lack of patch links suggests that remediation may require vendor updates or configuration changes once available. This vulnerability is critical for environments relying on BIG-IP PEM with URL categorization, as it can be triggered remotely without authentication or user interaction, potentially disrupting critical network traffic management functions.
Potential Impact
For European organizations, the impact of CVE-2025-35995 can be significant, especially for those relying on F5 BIG-IP appliances for load balancing, application delivery, and security enforcement. The TMM is central to traffic management; its unexpected termination can cause service outages, impacting availability of web applications, VPNs, and other critical services. This can lead to operational disruptions, loss of productivity, and potential financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and government are particularly vulnerable due to their reliance on continuous network availability and stringent service level agreements. Additionally, disruption in network traffic management could indirectly affect incident response and monitoring capabilities. Although no data confidentiality or integrity compromise is indicated, the denial of service could be exploited as part of a broader attack strategy to degrade defenses or distract security teams. Given the remote, unauthenticated nature of the exploit, attackers could target exposed BIG-IP PEM systems over the internet or internal networks, increasing the risk profile for European enterprises with internet-facing or poorly segmented BIG-IP deployments.
Mitigation Recommendations
1. Immediate mitigation should include disabling URL categorization policies or iRules using the 'urlcat' command on virtual servers until a patch or official fix is available. 2. Network segmentation and access controls should be enforced to restrict access to BIG-IP management and virtual servers, limiting exposure to untrusted networks. 3. Monitor BIG-IP system logs and TMM process health for signs of unexpected terminations or anomalies that could indicate exploitation attempts. 4. Implement strict ingress filtering and web application firewall (WAF) rules to detect and block suspicious or malformed requests targeting URL categorization features. 5. Engage with F5 Networks for official patches or updates addressing CVE-2025-35995 and plan for timely deployment once released. 6. Conduct internal vulnerability scans and penetration tests focusing on BIG-IP PEM configurations to identify and remediate exposure to this vulnerability. 7. Maintain up-to-date asset inventories to quickly identify affected BIG-IP versions and prioritize remediation efforts. These steps go beyond generic advice by focusing on configuration adjustments, monitoring, and network controls specific to the vulnerability's trigger conditions.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-35995: CWE-125 Out-of-bounds Read in F5 BIG-IP
Description
When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcat command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-35995 is a high-severity vulnerability affecting F5 BIG-IP systems, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability arises from an out-of-bounds read (CWE-125) in the Traffic Management Microkernel (TMM) component when the BIG-IP PEM system is licensed with URL categorization enabled. This condition is triggered if a URL categorization policy or an iRule using the 'urlcat' command is active on a virtual server. Under these circumstances, specially crafted or undisclosed requests can cause the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but directly affects availability by causing service disruption. The CVSS v3.1 base score is 7.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are currently reported in the wild, and software versions that have reached End of Technical Support (EoTS) are not evaluated for this vulnerability. The lack of patch links suggests that remediation may require vendor updates or configuration changes once available. This vulnerability is critical for environments relying on BIG-IP PEM with URL categorization, as it can be triggered remotely without authentication or user interaction, potentially disrupting critical network traffic management functions.
Potential Impact
For European organizations, the impact of CVE-2025-35995 can be significant, especially for those relying on F5 BIG-IP appliances for load balancing, application delivery, and security enforcement. The TMM is central to traffic management; its unexpected termination can cause service outages, impacting availability of web applications, VPNs, and other critical services. This can lead to operational disruptions, loss of productivity, and potential financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and government are particularly vulnerable due to their reliance on continuous network availability and stringent service level agreements. Additionally, disruption in network traffic management could indirectly affect incident response and monitoring capabilities. Although no data confidentiality or integrity compromise is indicated, the denial of service could be exploited as part of a broader attack strategy to degrade defenses or distract security teams. Given the remote, unauthenticated nature of the exploit, attackers could target exposed BIG-IP PEM systems over the internet or internal networks, increasing the risk profile for European enterprises with internet-facing or poorly segmented BIG-IP deployments.
Mitigation Recommendations
1. Immediate mitigation should include disabling URL categorization policies or iRules using the 'urlcat' command on virtual servers until a patch or official fix is available. 2. Network segmentation and access controls should be enforced to restrict access to BIG-IP management and virtual servers, limiting exposure to untrusted networks. 3. Monitor BIG-IP system logs and TMM process health for signs of unexpected terminations or anomalies that could indicate exploitation attempts. 4. Implement strict ingress filtering and web application firewall (WAF) rules to detect and block suspicious or malformed requests targeting URL categorization features. 5. Engage with F5 Networks for official patches or updates addressing CVE-2025-35995 and plan for timely deployment once released. 6. Conduct internal vulnerability scans and penetration tests focusing on BIG-IP PEM configurations to identify and remediate exposure to this vulnerability. 7. Maintain up-to-date asset inventories to quickly identify affected BIG-IP versions and prioritize remediation efforts. These steps go beyond generic advice by focusing on configuration adjustments, monitoring, and network controls specific to the vulnerability's trigger conditions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-04-23T22:28:26.371Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd86ba
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 7:11:36 AM
Last updated: 8/15/2025, 7:28:00 AM
Views: 13
Related Threats
CVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumPlex warns users to patch security vulnerability immediately
HighCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.