Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46706: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP

0
High
VulnerabilityCVE-2025-46706cvecve-2025-46706cwe-770
Published: Wed Oct 15 2025 (10/15/2025, 13:55:45 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When an iRule containing the HTTP::respond command is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:14:33 UTC

Technical Analysis

CVE-2025-46706 is a vulnerability categorized under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting F5 BIG-IP versions 17.1.0 and 16.1.0. The issue arises when an iRule containing the HTTP::respond command is configured on a virtual server. In this configuration, certain undisclosed requests can trigger excessive memory allocation without proper limits or throttling mechanisms. This uncontrolled resource consumption can degrade system performance or cause the BIG-IP device to become unresponsive, effectively resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The flaw does not impact confidentiality or integrity but severely affects availability. Despite no public exploits reported, the vulnerability's nature and ease of exploitation make it a critical concern for organizations relying on BIG-IP for load balancing, application delivery, and security functions. The lack of patches at the time of disclosure necessitates immediate mitigation steps to prevent exploitation. The vulnerability does not affect versions that have reached End of Technical Support (EoTS).

Potential Impact

The primary impact of CVE-2025-46706 is on the availability of F5 BIG-IP devices, which are widely used for load balancing, application delivery, and security in enterprise and service provider networks. Exploitation can lead to memory exhaustion, causing system instability or crashes, resulting in denial of service. This can disrupt critical business applications, degrade user experience, and potentially cause cascading failures in dependent systems. Organizations relying on BIG-IP for secure and reliable application delivery may face operational outages, impacting revenue and reputation. Since the vulnerability requires no authentication and can be triggered remotely, attackers can exploit it at scale, potentially targeting multiple devices in an organization. The absence of known exploits currently provides a window for proactive defense, but the risk remains high due to the ease of exploitation and critical role of affected systems.

Mitigation Recommendations

1. Monitor F5 Networks advisories closely for official patches addressing CVE-2025-46706 and apply them promptly once available. 2. Until patches are released, limit or disable iRules that use the HTTP::respond command on virtual servers, especially in environments exposed to untrusted networks. 3. Implement network-level rate limiting or filtering to restrict the volume of requests that can trigger the vulnerability, reducing the risk of resource exhaustion. 4. Use BIG-IP's built-in resource monitoring and alerting features to detect abnormal memory usage patterns indicative of exploitation attempts. 5. Segment and isolate BIG-IP management and virtual server interfaces from untrusted networks to minimize exposure. 6. Conduct regular configuration reviews to ensure iRules are necessary and optimized to prevent unintended resource consumption. 7. Employ Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect and block suspicious traffic targeting this vulnerability. 8. Prepare incident response plans to quickly respond to potential denial of service incidents affecting BIG-IP devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:03.911Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99327d7577a18001348

Added to database: 10/15/2025, 2:02:59 PM

Last enriched: 2/27/2026, 5:14:33 AM

Last updated: 3/25/2026, 3:26:10 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses