Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46706: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP

0
High
VulnerabilityCVE-2025-46706cvecve-2025-46706cwe-770
Published: Wed Oct 15 2025 (10/15/2025, 13:55:45 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When an iRule containing the HTTP::respond command is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:11:37 UTC

Technical Analysis

CVE-2025-46706 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting F5 BIG-IP versions 17.1.0 and 16.1.0. The issue arises when an iRule configured on a virtual server uses the HTTP::respond command. This configuration can be exploited by sending specific, undisclosed HTTP requests that cause the BIG-IP system to allocate excessive memory resources without proper limits or throttling mechanisms. The uncontrolled memory consumption can degrade system performance and ultimately lead to denial of service (DoS) conditions, impacting the availability of the services managed by BIG-IP. The vulnerability can be triggered remotely over the network without requiring authentication or user interaction, increasing its risk profile. Although no public exploits are known at this time, the vulnerability’s nature and ease of exploitation make it a significant threat. The vulnerability does not impact confidentiality or integrity but solely affects availability. F5 BIG-IP is widely used in enterprise environments for load balancing, application delivery, and security functions, making this vulnerability critical in environments where uptime and service continuity are essential. The lack of patches or official remediation guidance at the time of publication necessitates proactive mitigation strategies. The CVSS v3.1 score of 7.5 reflects high severity due to network attack vector, low complexity, no privileges required, and no user interaction needed, with impact limited to availability. Organizations should audit their iRule configurations, especially those using HTTP::respond, and monitor memory usage patterns to detect potential exploitation attempts.

Potential Impact

For European organizations, the primary impact of CVE-2025-46706 is the potential for denial of service attacks against critical network infrastructure managed by F5 BIG-IP devices. This can disrupt access to web applications, internal services, and cloud resources, leading to operational downtime and potential financial losses. Industries such as finance, telecommunications, healthcare, and government, which heavily rely on BIG-IP for secure and reliable application delivery, are particularly vulnerable. Service outages could also affect compliance with regulatory requirements around availability and incident response. Additionally, prolonged or repeated exploitation attempts could strain IT resources and incident response teams. The vulnerability’s remote exploitability without authentication increases the attack surface, potentially allowing threat actors to target European organizations from anywhere globally. Given the strategic importance of BIG-IP in securing and optimizing network traffic, successful exploitation could undermine trust in organizational IT infrastructure and impact business continuity.

Mitigation Recommendations

Since no official patches are currently available for CVE-2025-46706, European organizations should implement the following specific mitigations: 1) Review and audit all iRules configured on BIG-IP devices, focusing on those using the HTTP::respond command, to identify and limit exposure to potentially vulnerable configurations. 2) Implement rate limiting and connection throttling at the network perimeter or on the BIG-IP itself to reduce the risk of resource exhaustion from malicious requests. 3) Monitor memory utilization metrics and set up alerts for abnormal spikes that could indicate exploitation attempts. 4) Employ network segmentation and access controls to restrict exposure of BIG-IP management and virtual servers to untrusted networks. 5) Engage with F5 support and subscribe to their security advisories to receive updates on patches or workarounds as they become available. 6) Consider deploying Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) capable of detecting and blocking suspicious HTTP traffic patterns targeting iRule vulnerabilities. 7) Prepare incident response plans specifically addressing potential denial of service scenarios involving BIG-IP infrastructure. These targeted actions go beyond generic advice by focusing on configuration hygiene, proactive monitoring, and network-level protections tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:03.911Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99327d7577a18001348

Added to database: 10/15/2025, 2:02:59 PM

Last enriched: 10/15/2025, 2:11:37 PM

Last updated: 10/16/2025, 11:37:56 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats