CVE-2025-46706: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP
When an iRule containing the HTTP::respond command is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-46706 is a vulnerability categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting F5 BIG-IP versions 17.1.0 and 16.1.0. The issue arises when an iRule containing the HTTP::respond command is configured on a virtual server. In this configuration, certain undisclosed requests can trigger excessive memory allocation without proper limits or throttling mechanisms. This uncontrolled resource consumption can degrade system performance or cause the BIG-IP device to become unresponsive, effectively resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The flaw does not impact confidentiality or integrity but severely affects availability. Despite no public exploits reported, the vulnerability's nature and ease of exploitation make it a critical concern for organizations relying on BIG-IP for load balancing, application delivery, and security functions. The lack of patches at the time of disclosure necessitates immediate mitigation steps to prevent exploitation. The vulnerability does not affect versions that have reached End of Technical Support (EoTS).
Potential Impact
The primary impact of CVE-2025-46706 is on the availability of F5 BIG-IP devices, which are widely used for load balancing, application delivery, and security in enterprise and service provider networks. Exploitation can lead to memory exhaustion, causing system instability or crashes, resulting in denial of service. This can disrupt critical business applications, degrade user experience, and potentially cause cascading failures in dependent systems. Organizations relying on BIG-IP for secure and reliable application delivery may face operational outages, impacting revenue and reputation. Since the vulnerability requires no authentication and can be triggered remotely, attackers can exploit it at scale, potentially targeting multiple devices in an organization. The absence of known exploits currently provides a window for proactive defense, but the risk remains high due to the ease of exploitation and critical role of affected systems.
Mitigation Recommendations
1. Monitor F5 Networks advisories closely for official patches addressing CVE-2025-46706 and apply them promptly once available. 2. Until patches are released, limit or disable iRules that use the HTTP::respond command on virtual servers, especially in environments exposed to untrusted networks. 3. Implement network-level rate limiting or filtering to restrict the volume of requests that can trigger the vulnerability, reducing the risk of resource exhaustion. 4. Use BIG-IP's built-in resource monitoring and alerting features to detect abnormal memory usage patterns indicative of exploitation attempts. 5. Segment and isolate BIG-IP management and virtual server interfaces from untrusted networks to minimize exposure. 6. Conduct regular configuration reviews to ensure iRules are necessary and optimized to prevent unintended resource consumption. 7. Employ Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect and block suspicious traffic targeting this vulnerability. 8. Prepare incident response plans to quickly respond to potential denial of service incidents affecting BIG-IP devices.
Affected Countries
United States, United Kingdom, Germany, France, Japan, Australia, Canada, Netherlands, South Korea, Singapore
CVE-2025-46706: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP
Description
When an iRule containing the HTTP::respond command is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-46706 is a vulnerability categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting F5 BIG-IP versions 17.1.0 and 16.1.0. The issue arises when an iRule containing the HTTP::respond command is configured on a virtual server. In this configuration, certain undisclosed requests can trigger excessive memory allocation without proper limits or throttling mechanisms. This uncontrolled resource consumption can degrade system performance or cause the BIG-IP device to become unresponsive, effectively resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The flaw does not impact confidentiality or integrity but severely affects availability. Despite no public exploits reported, the vulnerability's nature and ease of exploitation make it a critical concern for organizations relying on BIG-IP for load balancing, application delivery, and security functions. The lack of patches at the time of disclosure necessitates immediate mitigation steps to prevent exploitation. The vulnerability does not affect versions that have reached End of Technical Support (EoTS).
Potential Impact
The primary impact of CVE-2025-46706 is on the availability of F5 BIG-IP devices, which are widely used for load balancing, application delivery, and security in enterprise and service provider networks. Exploitation can lead to memory exhaustion, causing system instability or crashes, resulting in denial of service. This can disrupt critical business applications, degrade user experience, and potentially cause cascading failures in dependent systems. Organizations relying on BIG-IP for secure and reliable application delivery may face operational outages, impacting revenue and reputation. Since the vulnerability requires no authentication and can be triggered remotely, attackers can exploit it at scale, potentially targeting multiple devices in an organization. The absence of known exploits currently provides a window for proactive defense, but the risk remains high due to the ease of exploitation and critical role of affected systems.
Mitigation Recommendations
1. Monitor F5 Networks advisories closely for official patches addressing CVE-2025-46706 and apply them promptly once available. 2. Until patches are released, limit or disable iRules that use the HTTP::respond command on virtual servers, especially in environments exposed to untrusted networks. 3. Implement network-level rate limiting or filtering to restrict the volume of requests that can trigger the vulnerability, reducing the risk of resource exhaustion. 4. Use BIG-IP's built-in resource monitoring and alerting features to detect abnormal memory usage patterns indicative of exploitation attempts. 5. Segment and isolate BIG-IP management and virtual server interfaces from untrusted networks to minimize exposure. 6. Conduct regular configuration reviews to ensure iRules are necessary and optimized to prevent unintended resource consumption. 7. Employ Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect and block suspicious traffic targeting this vulnerability. 8. Prepare incident response plans to quickly respond to potential denial of service incidents affecting BIG-IP devices.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:03.911Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99327d7577a18001348
Added to database: 10/15/2025, 2:02:59 PM
Last enriched: 2/27/2026, 5:14:33 AM
Last updated: 3/25/2026, 3:26:10 AM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.