CVE-2025-36525: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in F5 BIG-IP
When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-36525 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically when the Access Policy Manager (APM) virtual server is configured to use a PingAccess profile. The vulnerability is classified as a classic buffer overflow (CWE-120), which occurs due to improper handling of input size during buffer copy operations. An attacker can send specially crafted, undisclosed requests that cause the Traffic Management Microkernel (TMM) process to terminate unexpectedly. The TMM is a critical component responsible for managing network traffic and enforcing policies on BIG-IP devices. The affected versions include 15.1.0, 16.1.0, and 17.1.0, which are currently supported versions. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. This means the attack can be performed remotely over the network without any privileges or user interaction, and it impacts availability by causing denial of service through TMM termination. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not affect confidentiality or integrity directly but can severely disrupt service availability, potentially causing downtime or degraded performance of BIG-IP devices that are critical for load balancing, access management, and security enforcement in enterprise environments.
Potential Impact
For European organizations, the impact of this vulnerability can be significant due to the widespread use of F5 BIG-IP devices in enterprise networks, data centers, and cloud environments. BIG-IP devices often serve as gateways for secure remote access, application delivery controllers, and web application firewalls. A successful exploitation leading to TMM termination would result in denial of service, disrupting access to critical applications and services. This can affect financial institutions, healthcare providers, government agencies, and large enterprises that rely on BIG-IP for secure and reliable network traffic management. The disruption could lead to operational downtime, loss of productivity, and potential regulatory compliance issues under frameworks such as GDPR if service availability impacts data processing. Additionally, the lack of required authentication and user interaction lowers the barrier for attackers, increasing the risk of automated or widespread attacks. Although no exploits are currently known in the wild, the high severity and ease of exploitation make timely mitigation essential to prevent potential future attacks targeting European infrastructure.
Mitigation Recommendations
European organizations should immediately assess their deployment of F5 BIG-IP devices, particularly those configured with APM virtual servers using PingAccess profiles. Specific mitigation steps include: 1) Inventory and identify all BIG-IP devices running affected versions (15.1.0, 16.1.0, 17.1.0). 2) Monitor vendor communications closely for official patches or hotfixes and apply them promptly once available. 3) In the interim, consider disabling or restricting access to APM virtual servers configured with PingAccess profiles if feasible, to reduce exposure. 4) Implement network-level protections such as firewall rules or intrusion prevention systems to limit exposure of BIG-IP management and APM interfaces to trusted networks only. 5) Enable and review detailed logging and monitoring on BIG-IP devices to detect unusual or malformed requests that could indicate exploitation attempts. 6) Conduct regular vulnerability scanning and penetration testing focused on BIG-IP devices to identify potential exploitation vectors. 7) Develop and test incident response plans specifically addressing denial-of-service scenarios impacting BIG-IP infrastructure to ensure rapid recovery. These targeted actions go beyond generic advice by focusing on the specific configuration and operational context of the vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-36525: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in F5 BIG-IP
Description
When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-36525 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically when the Access Policy Manager (APM) virtual server is configured to use a PingAccess profile. The vulnerability is classified as a classic buffer overflow (CWE-120), which occurs due to improper handling of input size during buffer copy operations. An attacker can send specially crafted, undisclosed requests that cause the Traffic Management Microkernel (TMM) process to terminate unexpectedly. The TMM is a critical component responsible for managing network traffic and enforcing policies on BIG-IP devices. The affected versions include 15.1.0, 16.1.0, and 17.1.0, which are currently supported versions. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. This means the attack can be performed remotely over the network without any privileges or user interaction, and it impacts availability by causing denial of service through TMM termination. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not affect confidentiality or integrity directly but can severely disrupt service availability, potentially causing downtime or degraded performance of BIG-IP devices that are critical for load balancing, access management, and security enforcement in enterprise environments.
Potential Impact
For European organizations, the impact of this vulnerability can be significant due to the widespread use of F5 BIG-IP devices in enterprise networks, data centers, and cloud environments. BIG-IP devices often serve as gateways for secure remote access, application delivery controllers, and web application firewalls. A successful exploitation leading to TMM termination would result in denial of service, disrupting access to critical applications and services. This can affect financial institutions, healthcare providers, government agencies, and large enterprises that rely on BIG-IP for secure and reliable network traffic management. The disruption could lead to operational downtime, loss of productivity, and potential regulatory compliance issues under frameworks such as GDPR if service availability impacts data processing. Additionally, the lack of required authentication and user interaction lowers the barrier for attackers, increasing the risk of automated or widespread attacks. Although no exploits are currently known in the wild, the high severity and ease of exploitation make timely mitigation essential to prevent potential future attacks targeting European infrastructure.
Mitigation Recommendations
European organizations should immediately assess their deployment of F5 BIG-IP devices, particularly those configured with APM virtual servers using PingAccess profiles. Specific mitigation steps include: 1) Inventory and identify all BIG-IP devices running affected versions (15.1.0, 16.1.0, 17.1.0). 2) Monitor vendor communications closely for official patches or hotfixes and apply them promptly once available. 3) In the interim, consider disabling or restricting access to APM virtual servers configured with PingAccess profiles if feasible, to reduce exposure. 4) Implement network-level protections such as firewall rules or intrusion prevention systems to limit exposure of BIG-IP management and APM interfaces to trusted networks only. 5) Enable and review detailed logging and monitoring on BIG-IP devices to detect unusual or malformed requests that could indicate exploitation attempts. 6) Conduct regular vulnerability scanning and penetration testing focused on BIG-IP devices to identify potential exploitation vectors. 7) Develop and test incident response plans specifically addressing denial-of-service scenarios impacting BIG-IP infrastructure to ensure rapid recovery. These targeted actions go beyond generic advice by focusing on the specific configuration and operational context of the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-04-23T22:28:26.366Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd86c2
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 7:11:55 AM
Last updated: 8/14/2025, 4:59:17 AM
Views: 17
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.