Skip to main content

CVE-2025-35995: CWE-125 Out-of-bounds Read in F5 BIG-IP

High
VulnerabilityCVE-2025-35995cvecve-2025-35995cwe-125
Published: Wed May 07 2025 (05/07/2025, 22:04:10 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcat command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 07/05/2025, 07:11:36 UTC

Technical Analysis

CVE-2025-35995 is a high-severity vulnerability affecting F5 BIG-IP systems, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability arises from an out-of-bounds read (CWE-125) in the Traffic Management Microkernel (TMM) component when the BIG-IP PEM system is licensed with URL categorization enabled. This condition is triggered if a URL categorization policy or an iRule using the 'urlcat' command is active on a virtual server. Under these circumstances, specially crafted or undisclosed requests can cause the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but directly affects availability by causing service disruption. The CVSS v3.1 base score is 7.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are currently reported in the wild, and software versions that have reached End of Technical Support (EoTS) are not evaluated for this vulnerability. The lack of patch links suggests that remediation may require vendor updates or configuration changes once available. This vulnerability is critical for environments relying on BIG-IP PEM with URL categorization, as it can be triggered remotely without authentication or user interaction, potentially disrupting critical network traffic management functions.

Potential Impact

For European organizations, the impact of CVE-2025-35995 can be significant, especially for those relying on F5 BIG-IP appliances for load balancing, application delivery, and security enforcement. The TMM is central to traffic management; its unexpected termination can cause service outages, impacting availability of web applications, VPNs, and other critical services. This can lead to operational disruptions, loss of productivity, and potential financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and government are particularly vulnerable due to their reliance on continuous network availability and stringent service level agreements. Additionally, disruption in network traffic management could indirectly affect incident response and monitoring capabilities. Although no data confidentiality or integrity compromise is indicated, the denial of service could be exploited as part of a broader attack strategy to degrade defenses or distract security teams. Given the remote, unauthenticated nature of the exploit, attackers could target exposed BIG-IP PEM systems over the internet or internal networks, increasing the risk profile for European enterprises with internet-facing or poorly segmented BIG-IP deployments.

Mitigation Recommendations

1. Immediate mitigation should include disabling URL categorization policies or iRules using the 'urlcat' command on virtual servers until a patch or official fix is available. 2. Network segmentation and access controls should be enforced to restrict access to BIG-IP management and virtual servers, limiting exposure to untrusted networks. 3. Monitor BIG-IP system logs and TMM process health for signs of unexpected terminations or anomalies that could indicate exploitation attempts. 4. Implement strict ingress filtering and web application firewall (WAF) rules to detect and block suspicious or malformed requests targeting URL categorization features. 5. Engage with F5 Networks for official patches or updates addressing CVE-2025-35995 and plan for timely deployment once released. 6. Conduct internal vulnerability scans and penetration tests focusing on BIG-IP PEM configurations to identify and remediate exposure to this vulnerability. 7. Maintain up-to-date asset inventories to quickly identify affected BIG-IP versions and prioritize remediation efforts. These steps go beyond generic advice by focusing on configuration adjustments, monitoring, and network controls specific to the vulnerability's trigger conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-04-23T22:28:26.371Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd86ba

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 7:11:36 AM

Last updated: 8/15/2025, 7:28:00 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats