CVE-2025-46706: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP
CVE-2025-46706 is a high-severity vulnerability in F5 BIG-IP versions 17. 1. 0 and 16. 1. 0 involving improper resource allocation when an iRule with the HTTP::respond command is used. This flaw allows unauthenticated remote attackers to trigger excessive memory consumption on affected virtual servers, potentially leading to denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires no user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. European organizations relying on F5 BIG-IP for load balancing and application delivery are at risk, especially those with critical infrastructure or high-traffic environments.
AI Analysis
Technical Summary
CVE-2025-46706 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting F5 BIG-IP versions 17.1.0 and 16.1.0. The issue arises when an iRule containing the HTTP::respond command is configured on a virtual server. Attackers can send specially crafted, undisclosed requests that cause the BIG-IP system to allocate excessive memory resources without proper limits or throttling. This uncontrolled resource consumption can lead to memory exhaustion, resulting in denial of service (DoS) conditions where legitimate traffic is dropped or the system becomes unresponsive. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, increasing the risk profile. Although the vulnerability does not compromise confidentiality or integrity, the impact on availability is significant. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects supported versions only, excluding those that have reached End of Technical Support (EoTS). F5 BIG-IP is widely used in enterprise and service provider environments for load balancing, application delivery, and security functions, making this vulnerability particularly concerning for high-availability network infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-46706 is the potential for denial of service on critical network infrastructure. F5 BIG-IP devices are commonly deployed in data centers, cloud environments, and enterprise networks to manage application traffic and provide security services. An attacker exploiting this vulnerability could cause service outages, disrupt business operations, and degrade user experience by exhausting memory resources on the BIG-IP system. This is especially critical for sectors such as finance, telecommunications, healthcare, and government, where uptime and availability are paramount. Additionally, service providers hosting infrastructure for multiple clients could see cascading effects impacting numerous organizations. The lack of authentication and user interaction requirements means attacks can be automated and launched at scale, increasing the risk of widespread disruption. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score (7.5) and ease of exploitation underscore the urgency for European entities to address this vulnerability promptly.
Mitigation Recommendations
1. Monitor and audit all iRules configured on BIG-IP virtual servers, specifically those using the HTTP::respond command, to identify and assess potential misuse or excessive resource consumption. 2. Implement rate limiting or traffic shaping on virtual servers to restrict the volume of requests that can trigger the vulnerable iRule, thereby reducing the risk of memory exhaustion. 3. Apply vendor patches or updates as soon as they become available; maintain close communication with F5 Networks for security advisories and patch releases. 4. Use BIG-IP system resource monitoring tools to detect abnormal memory usage patterns and configure alerts for early detection of potential exploitation attempts. 5. Consider deploying network-level protections such as Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) to detect and block suspicious traffic targeting the vulnerable iRule. 6. For critical environments, evaluate the necessity of the HTTP::respond command in iRules and refactor or remove it if possible to minimize attack surface. 7. Maintain up-to-date documentation and incident response plans specific to BIG-IP vulnerabilities to ensure rapid response in case of exploitation. 8. Engage in threat intelligence sharing with industry peers and national cybersecurity centers to stay informed about emerging exploit techniques related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-46706: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP
Description
CVE-2025-46706 is a high-severity vulnerability in F5 BIG-IP versions 17. 1. 0 and 16. 1. 0 involving improper resource allocation when an iRule with the HTTP::respond command is used. This flaw allows unauthenticated remote attackers to trigger excessive memory consumption on affected virtual servers, potentially leading to denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires no user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. European organizations relying on F5 BIG-IP for load balancing and application delivery are at risk, especially those with critical infrastructure or high-traffic environments.
AI-Powered Analysis
Technical Analysis
CVE-2025-46706 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting F5 BIG-IP versions 17.1.0 and 16.1.0. The issue arises when an iRule containing the HTTP::respond command is configured on a virtual server. Attackers can send specially crafted, undisclosed requests that cause the BIG-IP system to allocate excessive memory resources without proper limits or throttling. This uncontrolled resource consumption can lead to memory exhaustion, resulting in denial of service (DoS) conditions where legitimate traffic is dropped or the system becomes unresponsive. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, increasing the risk profile. Although the vulnerability does not compromise confidentiality or integrity, the impact on availability is significant. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects supported versions only, excluding those that have reached End of Technical Support (EoTS). F5 BIG-IP is widely used in enterprise and service provider environments for load balancing, application delivery, and security functions, making this vulnerability particularly concerning for high-availability network infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-46706 is the potential for denial of service on critical network infrastructure. F5 BIG-IP devices are commonly deployed in data centers, cloud environments, and enterprise networks to manage application traffic and provide security services. An attacker exploiting this vulnerability could cause service outages, disrupt business operations, and degrade user experience by exhausting memory resources on the BIG-IP system. This is especially critical for sectors such as finance, telecommunications, healthcare, and government, where uptime and availability are paramount. Additionally, service providers hosting infrastructure for multiple clients could see cascading effects impacting numerous organizations. The lack of authentication and user interaction requirements means attacks can be automated and launched at scale, increasing the risk of widespread disruption. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score (7.5) and ease of exploitation underscore the urgency for European entities to address this vulnerability promptly.
Mitigation Recommendations
1. Monitor and audit all iRules configured on BIG-IP virtual servers, specifically those using the HTTP::respond command, to identify and assess potential misuse or excessive resource consumption. 2. Implement rate limiting or traffic shaping on virtual servers to restrict the volume of requests that can trigger the vulnerable iRule, thereby reducing the risk of memory exhaustion. 3. Apply vendor patches or updates as soon as they become available; maintain close communication with F5 Networks for security advisories and patch releases. 4. Use BIG-IP system resource monitoring tools to detect abnormal memory usage patterns and configure alerts for early detection of potential exploitation attempts. 5. Consider deploying network-level protections such as Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) to detect and block suspicious traffic targeting the vulnerable iRule. 6. For critical environments, evaluate the necessity of the HTTP::respond command in iRules and refactor or remove it if possible to minimize attack surface. 7. Maintain up-to-date documentation and incident response plans specific to BIG-IP vulnerabilities to ensure rapid response in case of exploitation. 8. Engage in threat intelligence sharing with industry peers and national cybersecurity centers to stay informed about emerging exploit techniques related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:03.911Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99327d7577a18001348
Added to database: 10/15/2025, 2:02:59 PM
Last enriched: 10/23/2025, 1:02:06 AM
Last updated: 11/29/2025, 6:22:36 PM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-39936: n/a
HighCVE-2025-6666: Use of Hard-coded Cryptographic Key in motogadget mo.lock Ignition Lock
LowCVE-2025-65892: n/a
UnknownCVE-2025-65540: n/a
UnknownCVE-2025-66221: CWE-67: Improper Handling of Windows Device Names in pallets werkzeug
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.