CVE-2025-41414: CWE-476 NULL Pointer Dereference in F5 BIG-IP
When HTTP/2 client and server profile is configured on a virtual server, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI Analysis
Technical Summary
CVE-2025-41414 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability arises from a NULL Pointer Dereference (CWE-476) issue within the Traffic Management Microkernel (TMM) component when HTTP/2 client and server profiles are configured on a virtual server. Under certain undisclosed request conditions, this flaw causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing a critical component responsible for traffic management and load balancing. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches are listed at the time of publication. The vulnerability is relevant only to supported versions, excluding those that have reached End of Technical Support (EoTS). Given the critical role of BIG-IP devices in managing enterprise network traffic, this vulnerability could disrupt network operations and service availability if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-41414 could be significant, especially for enterprises and service providers relying on F5 BIG-IP devices for load balancing, application delivery, and security functions. The denial of service caused by TMM termination can lead to network outages, degraded application performance, and potential downtime of critical services. This disruption could affect sectors such as finance, telecommunications, healthcare, and government, where high availability and network reliability are paramount. Additionally, prolonged outages may result in financial losses, regulatory non-compliance (e.g., GDPR mandates on service availability), and reputational damage. The fact that exploitation requires no authentication or user interaction increases the risk of automated attacks from remote adversaries. Although no known exploits exist currently, the public disclosure and high CVSS score may prompt threat actors to develop exploits, increasing the urgency for mitigation in European contexts where F5 BIG-IP devices are widely deployed.
Mitigation Recommendations
European organizations should immediately assess their deployment of F5 BIG-IP devices to determine if affected versions (15.1.0, 16.1.0, 17.1.0) with HTTP/2 client and server profiles enabled on virtual servers are in use. In the absence of an official patch, organizations should consider the following mitigations: 1) Temporarily disable HTTP/2 profiles on virtual servers where feasible to prevent triggering the vulnerability; 2) Implement network-level protections such as rate limiting and filtering to block or restrict suspicious HTTP/2 traffic patterns that could cause TMM termination; 3) Monitor BIG-IP system logs and TMM process health closely for signs of crashes or abnormal behavior; 4) Employ redundancy and failover configurations to minimize service disruption if a TMM crash occurs; 5) Engage with F5 support channels for updates on patches or workarounds and apply them promptly once available; 6) Conduct internal penetration testing and vulnerability scanning to identify exposure; 7) Harden network perimeter defenses to reduce exposure to untrusted networks. These targeted actions go beyond generic advice by focusing on the specific conditions and configurations that trigger the vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-41414: CWE-476 NULL Pointer Dereference in F5 BIG-IP
Description
When HTTP/2 client and server profile is configured on a virtual server, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
AI-Powered Analysis
Technical Analysis
CVE-2025-41414 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability arises from a NULL Pointer Dereference (CWE-476) issue within the Traffic Management Microkernel (TMM) component when HTTP/2 client and server profiles are configured on a virtual server. Under certain undisclosed request conditions, this flaw causes the TMM process to terminate unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing a critical component responsible for traffic management and load balancing. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and no patches are listed at the time of publication. The vulnerability is relevant only to supported versions, excluding those that have reached End of Technical Support (EoTS). Given the critical role of BIG-IP devices in managing enterprise network traffic, this vulnerability could disrupt network operations and service availability if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-41414 could be significant, especially for enterprises and service providers relying on F5 BIG-IP devices for load balancing, application delivery, and security functions. The denial of service caused by TMM termination can lead to network outages, degraded application performance, and potential downtime of critical services. This disruption could affect sectors such as finance, telecommunications, healthcare, and government, where high availability and network reliability are paramount. Additionally, prolonged outages may result in financial losses, regulatory non-compliance (e.g., GDPR mandates on service availability), and reputational damage. The fact that exploitation requires no authentication or user interaction increases the risk of automated attacks from remote adversaries. Although no known exploits exist currently, the public disclosure and high CVSS score may prompt threat actors to develop exploits, increasing the urgency for mitigation in European contexts where F5 BIG-IP devices are widely deployed.
Mitigation Recommendations
European organizations should immediately assess their deployment of F5 BIG-IP devices to determine if affected versions (15.1.0, 16.1.0, 17.1.0) with HTTP/2 client and server profiles enabled on virtual servers are in use. In the absence of an official patch, organizations should consider the following mitigations: 1) Temporarily disable HTTP/2 profiles on virtual servers where feasible to prevent triggering the vulnerability; 2) Implement network-level protections such as rate limiting and filtering to block or restrict suspicious HTTP/2 traffic patterns that could cause TMM termination; 3) Monitor BIG-IP system logs and TMM process health closely for signs of crashes or abnormal behavior; 4) Employ redundancy and failover configurations to minimize service disruption if a TMM crash occurs; 5) Engage with F5 support channels for updates on patches or workarounds and apply them promptly once available; 6) Conduct internal penetration testing and vulnerability scanning to identify exposure; 7) Harden network perimeter defenses to reduce exposure to untrusted networks. These targeted actions go beyond generic advice by focusing on the specific conditions and configurations that trigger the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-04-23T22:28:26.354Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd86c6
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 7:24:36 AM
Last updated: 8/18/2025, 11:32:11 PM
Views: 17
Related Threats
Exploit weaponizes SAP NetWeaver bugs for full system compromise
HighCVE-2025-32947: CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')
HighCVE-2025-57734: CWE-538 in JetBrains TeamCity
MediumCVE-2025-57733: CWE-77 in JetBrains TeamCity
MediumCVE-2025-57732: CWE-282 in JetBrains TeamCity
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.