Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53521: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP

0
High
VulnerabilityCVE-2025-53521cvecve-2025-53521cwe-770
Published: Wed Oct 15 2025 (10/15/2025, 13:55:52 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP APM Access Policy is configured on a virtual server, undisclosed traffic can cause TMM to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:13:13 UTC

Technical Analysis

CVE-2025-53521 is a vulnerability identified in F5 BIG-IP devices, specifically affecting the Traffic Management Microkernel (TMM) component when an Access Policy Manager (APM) Access Policy is configured on a virtual server. The root cause is a CWE-770 weakness, which involves allocation of resources without proper limits or throttling. This allows an attacker to send specially crafted, undisclosed traffic that exhausts resources, causing the TMM process to terminate unexpectedly. The termination of TMM results in a denial-of-service (DoS) condition, disrupting the availability of services managed by BIG-IP, including load balancing, access management, and security functions. The vulnerability affects multiple versions of BIG-IP software, including 15.1.0, 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported. Exploitation requires no authentication or user interaction and can be performed remotely over the network, increasing the attack surface. Although no public exploits or active attacks have been reported yet, the vulnerability’s nature and the critical role of BIG-IP devices in enterprise and service provider networks make it a significant risk. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and the impact on availability, while confidentiality and integrity remain unaffected. No patches have been officially released at the time of this report, and software versions that have reached End of Technical Support (EoTS) are excluded from evaluation. Organizations using BIG-IP with APM Access Policies should prioritize monitoring and mitigation to prevent potential service disruptions.

Potential Impact

For European organizations, the primary impact of CVE-2025-53521 is the potential for denial-of-service attacks that disrupt critical network infrastructure and access management services. BIG-IP devices are widely used in Europe by enterprises, telecom providers, financial institutions, and government agencies to secure and manage network traffic. A successful exploitation could lead to downtime of web applications, VPN services, and load balancing functions, affecting business continuity and user access. This disruption could be particularly damaging for sectors reliant on high availability and secure remote access, such as banking, healthcare, and public administration. Additionally, service providers using BIG-IP to manage customer traffic might experience degraded service quality or outages, leading to reputational damage and regulatory scrutiny under frameworks like GDPR. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact alone can cause significant operational and financial consequences. The lack of required authentication and the ability to exploit remotely increase the risk of widespread attacks if threat actors develop exploits.

Mitigation Recommendations

1. Monitor network traffic to detect unusual or excessive requests targeting BIG-IP virtual servers configured with APM Access Policies. 2. Implement rate limiting and traffic shaping at network edges to reduce the risk of resource exhaustion. 3. Restrict access to BIG-IP management and virtual servers to trusted IP ranges and enforce strict firewall rules. 4. Regularly review and minimize the attack surface by disabling unused virtual servers or APM policies. 5. Apply vendor security advisories and patches promptly once they become available for the affected BIG-IP versions. 6. Consider deploying redundancy and failover mechanisms to maintain service availability in case of TMM termination. 7. Conduct penetration testing and resilience assessments focusing on resource exhaustion scenarios. 8. Engage with F5 support and subscribe to security bulletins to stay informed about updates and mitigations. 9. For critical environments, evaluate the feasibility of upgrading to newer BIG-IP versions with enhanced resource management controls. 10. Document and rehearse incident response plans specifically addressing DoS conditions related to BIG-IP devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:38.083Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99327d7577a18004061

Added to database: 10/15/2025, 2:02:59 PM

Last enriched: 10/15/2025, 2:13:13 PM

Last updated: 10/16/2025, 12:27:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats