Skip to main content

CVE-2025-41433: CWE-476 NULL Pointer Dereference in F5 BIG-IP

High
VulnerabilityCVE-2025-41433cvecve-2025-41433cwe-476
Published: Wed May 07 2025 (05/07/2025, 22:04:09 UTC)
Source: CVE
Vendor/Project: F5
Product: BIG-IP

Description

When a Session Initiation Protocol (SIP) message routing framework (MRF) application layer gateway (ALG) profile is configured on a Message Routing virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 07/05/2025, 07:11:08 UTC

Technical Analysis

CVE-2025-41433 is a high-severity vulnerability affecting F5 BIG-IP devices, specifically versions 15.1.0, 16.1.0, and 17.1.0. The vulnerability arises from a NULL pointer dereference (CWE-476) within the Session Initiation Protocol (SIP) Message Routing Framework (MRF) Application Layer Gateway (ALG) profile when configured on a Message Routing virtual server. This flaw can be triggered by sending specially crafted, undisclosed SIP requests to the vulnerable BIG-IP system, causing the Traffic Management Microkernel (TMM) to crash or terminate unexpectedly. The TMM is a critical component responsible for processing and managing network traffic on BIG-IP devices. A crash of the TMM results in a denial of service (DoS) condition, disrupting network traffic management and potentially impacting availability of services relying on the BIG-IP appliance. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no known exploits are currently reported in the wild, the ease of exploitation and the critical role of BIG-IP devices in enterprise and service provider networks make this a significant threat. The vulnerability does not impact confidentiality or integrity but has a high impact on availability. The affected software versions are still under support, but no patch links are currently provided, indicating that mitigation may require configuration changes or vendor updates once available. This vulnerability highlights the importance of securing SIP-related configurations and monitoring BIG-IP devices for abnormal TMM behavior or crashes.

Potential Impact

For European organizations, the impact of CVE-2025-41433 can be substantial, especially for those relying on F5 BIG-IP devices for load balancing, traffic management, and security functions in their network infrastructure. The denial of service caused by TMM termination can lead to network outages, degraded application performance, and disruption of critical services such as VoIP, unified communications, and other SIP-based applications. This can affect enterprises, telecommunications providers, financial institutions, and government agencies that depend on high availability and resilience of their network infrastructure. Additionally, prolonged downtime or repeated crashes could increase operational costs and damage organizational reputation. Given the remote exploitability and lack of required privileges, attackers could target exposed BIG-IP devices to cause service interruptions without needing insider access. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. European organizations must consider the potential for targeted attacks exploiting this vulnerability to disrupt critical communications and network services.

Mitigation Recommendations

1. Monitor F5 BIG-IP devices for signs of TMM crashes or abnormal behavior, especially on virtual servers configured with SIP MRF ALG profiles. 2. Temporarily disable or avoid using the SIP MRF ALG profile on Message Routing virtual servers if feasible until a vendor patch or update is available. 3. Restrict network exposure of BIG-IP management and virtual server interfaces to trusted networks and implement strict access controls and network segmentation to limit potential attack vectors. 4. Employ network-level protections such as firewalls and intrusion detection/prevention systems (IDS/IPS) to detect and block malformed SIP traffic targeting the vulnerability. 5. Stay informed on vendor advisories and apply patches or firmware updates promptly once released by F5. 6. Conduct regular security assessments and penetration testing focusing on SIP traffic handling and BIG-IP configurations to identify potential weaknesses. 7. Implement robust logging and alerting mechanisms to detect unusual SIP traffic patterns or repeated TMM restarts, enabling rapid incident response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-04-23T22:28:26.349Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd86ac

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 7:11:08 AM

Last updated: 8/15/2025, 12:07:08 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats