Skip to main content

CVE-2025-41414: CWE-476 NULL Pointer Dereference in F5 BIG-IP

High
VulnerabilityCVE-2025-41414cvecve-2025-41414cwe-476
Published: Wed May 07 2025 (05/07/2025, 22:04:09 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP

Description

When HTTP/2 client and server profile is configured on a virtual server, undisclosed requests can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

AI-Powered Analysis

AILast updated: 07/05/2025, 07:24:36 UTC

Technical Analysis

CVE-2025-41414 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability arises from a NULL Pointer Dereference (CWE-476) issue within the Traffic Management Microkernel (TMM) component when HTTP/2 client and server profiles are configured on a virtual server. Under certain undisclosed request conditions, this flaw causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing a critical component responsible for traffic management and load balancing. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches are listed at the time of publication. The vulnerability is relevant only to supported versions, excluding those that have reached End of Technical Support (EoTS). Given the critical role of BIG-IP devices in managing enterprise network traffic, this vulnerability could disrupt network operations and service availability if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-41414 could be significant, especially for enterprises and service providers relying on F5 BIG-IP devices for load balancing, application delivery, and security functions. The denial of service caused by TMM termination can lead to network outages, degraded application performance, and potential downtime of critical services. This disruption could affect sectors such as finance, telecommunications, healthcare, and government, where high availability and network reliability are paramount. Additionally, prolonged outages may result in financial losses, regulatory non-compliance (e.g., GDPR mandates on service availability), and reputational damage. The fact that exploitation requires no authentication or user interaction increases the risk of automated attacks from remote adversaries. Although no known exploits exist currently, the public disclosure and high CVSS score may prompt threat actors to develop exploits, increasing the urgency for mitigation in European contexts where F5 BIG-IP devices are widely deployed.

Mitigation Recommendations

European organizations should immediately assess their deployment of F5 BIG-IP devices to determine if affected versions (15.1.0, 16.1.0, 17.1.0) with HTTP/2 client and server profiles enabled on virtual servers are in use. In the absence of an official patch, organizations should consider the following mitigations: 1) Temporarily disable HTTP/2 profiles on virtual servers where feasible to prevent triggering the vulnerability; 2) Implement network-level protections such as rate limiting and filtering to block or restrict suspicious HTTP/2 traffic patterns that could cause TMM termination; 3) Monitor BIG-IP system logs and TMM process health closely for signs of crashes or abnormal behavior; 4) Employ redundancy and failover configurations to minimize service disruption if a TMM crash occurs; 5) Engage with F5 support channels for updates on patches or workarounds and apply them promptly once available; 6) Conduct internal penetration testing and vulnerability scanning to identify exposure; 7) Harden network perimeter defenses to reduce exposure to untrusted networks. These targeted actions go beyond generic advice by focusing on the specific conditions and configurations that trigger the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-04-23T22:28:26.354Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd86c6

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 7:24:36 AM

Last updated: 8/18/2025, 11:32:11 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats