CVE-2025-36557: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in F5 BIG-IP
When an HTTP profile with the Enforce RFC Compliance option is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-36557 is a high-severity buffer overflow vulnerability (CWE-120) affecting F5 BIG-IP devices, specifically versions 17.1.0 and 16.1.0. The vulnerability arises when an HTTP profile configured with the 'Enforce RFC Compliance' option is applied to a virtual server. In this configuration, specially crafted, undisclosed HTTP requests can trigger a buffer overflow in the Traffic Management Microkernel (TMM), the core component responsible for processing and managing network traffic on BIG-IP devices. This overflow causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 7.5, reflecting a high impact on availability (A:H) but no direct impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects supported versions only, excluding those that have reached End of Technical Support (EoTS). Given the critical role of BIG-IP devices in load balancing, application delivery, and security functions, exploitation could disrupt critical network infrastructure and services.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for enterprises and service providers relying on F5 BIG-IP for application delivery and security. A successful exploit would cause the TMM to crash, leading to service outages, degraded network performance, or complete loss of access to protected applications. This can disrupt business continuity, impact customer-facing services, and potentially cause cascading failures in dependent systems. Critical sectors such as finance, healthcare, telecommunications, and government agencies that depend on BIG-IP for secure and reliable traffic management are particularly at risk. The lack of confidentiality or integrity impact reduces the risk of data breaches directly from this vulnerability, but the availability impact alone can cause operational and reputational damage. Additionally, the ease of remote exploitation without authentication increases the threat level, especially in environments exposed to the internet or untrusted networks.
Mitigation Recommendations
European organizations should immediately review their BIG-IP configurations to identify virtual servers using HTTP profiles with the 'Enforce RFC Compliance' option enabled. Until a vendor patch is available, consider temporarily disabling this option or isolating affected virtual servers from untrusted networks to reduce exposure. Implement strict network segmentation and firewall rules to limit access to BIG-IP management and traffic interfaces. Monitor BIG-IP system logs and network traffic for unusual or malformed HTTP requests that could indicate exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential buffer overflow attacks targeting BIG-IP. Plan and test patch deployment procedures to apply vendor updates promptly once released. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions caused by exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-36557: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in F5 BIG-IP
Description
When an HTTP profile with the Enforce RFC Compliance option is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-36557 is a high-severity buffer overflow vulnerability (CWE-120) affecting F5 BIG-IP devices, specifically versions 17.1.0 and 16.1.0. The vulnerability arises when an HTTP profile configured with the 'Enforce RFC Compliance' option is applied to a virtual server. In this configuration, specially crafted, undisclosed HTTP requests can trigger a buffer overflow in the Traffic Management Microkernel (TMM), the core component responsible for processing and managing network traffic on BIG-IP devices. This overflow causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 7.5, reflecting a high impact on availability (A:H) but no direct impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects supported versions only, excluding those that have reached End of Technical Support (EoTS). Given the critical role of BIG-IP devices in load balancing, application delivery, and security functions, exploitation could disrupt critical network infrastructure and services.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for enterprises and service providers relying on F5 BIG-IP for application delivery and security. A successful exploit would cause the TMM to crash, leading to service outages, degraded network performance, or complete loss of access to protected applications. This can disrupt business continuity, impact customer-facing services, and potentially cause cascading failures in dependent systems. Critical sectors such as finance, healthcare, telecommunications, and government agencies that depend on BIG-IP for secure and reliable traffic management are particularly at risk. The lack of confidentiality or integrity impact reduces the risk of data breaches directly from this vulnerability, but the availability impact alone can cause operational and reputational damage. Additionally, the ease of remote exploitation without authentication increases the threat level, especially in environments exposed to the internet or untrusted networks.
Mitigation Recommendations
European organizations should immediately review their BIG-IP configurations to identify virtual servers using HTTP profiles with the 'Enforce RFC Compliance' option enabled. Until a vendor patch is available, consider temporarily disabling this option or isolating affected virtual servers from untrusted networks to reduce exposure. Implement strict network segmentation and firewall rules to limit access to BIG-IP management and traffic interfaces. Monitor BIG-IP system logs and network traffic for unusual or malformed HTTP requests that could indicate exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential buffer overflow attacks targeting BIG-IP. Plan and test patch deployment procedures to apply vendor updates promptly once released. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions caused by exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-04-23T22:28:26.322Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb2db
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 2:20:19 PM
Last updated: 8/13/2025, 3:14:55 PM
Views: 22
Related Threats
Top Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.