Skip to main content

CVE-2025-36525: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in F5 BIG-IP

High
VulnerabilityCVE-2025-36525cvecve-2025-36525cwe-120
Published: Wed May 07 2025 (05/07/2025, 22:04:10 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 07/05/2025, 07:11:55 UTC

Technical Analysis

CVE-2025-36525 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically when the Access Policy Manager (APM) virtual server is configured to use a PingAccess profile. The vulnerability is classified as a classic buffer overflow (CWE-120), which occurs due to improper handling of input size during buffer copy operations. An attacker can send specially crafted, undisclosed requests that cause the Traffic Management Microkernel (TMM) process to terminate unexpectedly. The TMM is a critical component responsible for managing network traffic and enforcing policies on BIG-IP devices. The affected versions include 15.1.0, 16.1.0, and 17.1.0, which are currently supported versions. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. This means the attack can be performed remotely over the network without any privileges or user interaction, and it impacts availability by causing denial of service through TMM termination. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not affect confidentiality or integrity directly but can severely disrupt service availability, potentially causing downtime or degraded performance of BIG-IP devices that are critical for load balancing, access management, and security enforcement in enterprise environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant due to the widespread use of F5 BIG-IP devices in enterprise networks, data centers, and cloud environments. BIG-IP devices often serve as gateways for secure remote access, application delivery controllers, and web application firewalls. A successful exploitation leading to TMM termination would result in denial of service, disrupting access to critical applications and services. This can affect financial institutions, healthcare providers, government agencies, and large enterprises that rely on BIG-IP for secure and reliable network traffic management. The disruption could lead to operational downtime, loss of productivity, and potential regulatory compliance issues under frameworks such as GDPR if service availability impacts data processing. Additionally, the lack of required authentication and user interaction lowers the barrier for attackers, increasing the risk of automated or widespread attacks. Although no exploits are currently known in the wild, the high severity and ease of exploitation make timely mitigation essential to prevent potential future attacks targeting European infrastructure.

Mitigation Recommendations

European organizations should immediately assess their deployment of F5 BIG-IP devices, particularly those configured with APM virtual servers using PingAccess profiles. Specific mitigation steps include: 1) Inventory and identify all BIG-IP devices running affected versions (15.1.0, 16.1.0, 17.1.0). 2) Monitor vendor communications closely for official patches or hotfixes and apply them promptly once available. 3) In the interim, consider disabling or restricting access to APM virtual servers configured with PingAccess profiles if feasible, to reduce exposure. 4) Implement network-level protections such as firewall rules or intrusion prevention systems to limit exposure of BIG-IP management and APM interfaces to trusted networks only. 5) Enable and review detailed logging and monitoring on BIG-IP devices to detect unusual or malformed requests that could indicate exploitation attempts. 6) Conduct regular vulnerability scanning and penetration testing focused on BIG-IP devices to identify potential exploitation vectors. 7) Develop and test incident response plans specifically addressing denial-of-service scenarios impacting BIG-IP infrastructure to ensure rapid recovery. These targeted actions go beyond generic advice by focusing on the specific configuration and operational context of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-04-23T22:28:26.366Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd86c2

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 7:11:55 AM

Last updated: 8/14/2025, 4:59:17 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats