CVE-2025-54479: CWE-787: Out-of-bounds Write in F5 BIG-IP
CVE-2025-54479 is a high-severity vulnerability in F5 BIG-IP devices caused by an out-of-bounds write in the Traffic Management Microkernel (TMM). It occurs when a classification profile is configured on a virtual server without an HTTP or HTTP/2 profile, allowing certain undisclosed requests to trigger TMM termination. The vulnerability affects multiple BIG-IP versions including 15. 1. 0 through 17. 5. 0. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While no known exploits are currently in the wild, successful exploitation results in denial of service by crashing the TMM, impacting availability but not confidentiality or integrity. European organizations relying on BIG-IP for load balancing and application delivery are at risk of service disruption.
AI Analysis
Technical Summary
CVE-2025-54479 is an out-of-bounds write vulnerability classified under CWE-787 that affects the Traffic Management Microkernel (TMM) component of F5 BIG-IP devices. The flaw is triggered when a classification profile is configured on a virtual server that lacks an HTTP or HTTP/2 profile. Under these conditions, specially crafted, undisclosed network requests can cause the TMM process to terminate unexpectedly. This termination leads to a denial of service condition, disrupting the load balancing and application delivery functions of the BIG-IP device. The vulnerability affects multiple versions of BIG-IP, specifically 15.1.0, 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported and not end-of-support. The CVSS v3.1 base score of 7.5 indicates a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability arises from improper bounds checking in the TMM when processing certain classification profiles, leading to memory corruption and process crash. This flaw can be exploited remotely without authentication, making it a significant risk for organizations using BIG-IP devices as critical network infrastructure components.
Potential Impact
The primary impact of CVE-2025-54479 is a denial of service (DoS) condition caused by the termination of the TMM process on affected BIG-IP devices. For European organizations, this can lead to significant service disruptions, especially for those relying on BIG-IP for load balancing, application delivery, and security functions such as web application firewalls and SSL offloading. The loss of availability can affect critical business applications, customer-facing services, and internal operations. Since the vulnerability does not impact confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, the disruption of network services can have cascading effects, including loss of productivity, reputational damage, and potential regulatory compliance issues under frameworks like GDPR if service outages affect personal data processing. The ease of exploitation without authentication and user interaction increases the risk of opportunistic attacks, particularly in environments exposed to the internet. Organizations with high availability requirements or those operating in sectors such as finance, telecommunications, and government are especially vulnerable to operational impacts.
Mitigation Recommendations
To mitigate CVE-2025-54479, European organizations should immediately review their BIG-IP virtual server configurations to ensure that classification profiles are not applied without an accompanying HTTP or HTTP/2 profile. This configuration check can prevent the triggering of the out-of-bounds write condition. Network segmentation and limiting exposure of BIG-IP management and data plane interfaces to untrusted networks can reduce the attack surface. Organizations should monitor vendor advisories closely for the release of official patches or updates addressing this vulnerability and plan for prompt deployment. Implementing robust network intrusion detection and prevention systems (IDS/IPS) with signatures targeting anomalous traffic patterns related to this vulnerability can provide additional protection. Regular backups and failover configurations should be tested to ensure rapid recovery in case of service disruption. Additionally, logging and alerting on TMM process crashes can help detect attempted exploitation. Finally, organizations should consider engaging with F5 support or professional services for tailored guidance and to verify the security posture of their BIG-IP deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-54479: CWE-787: Out-of-bounds Write in F5 BIG-IP
Description
CVE-2025-54479 is a high-severity vulnerability in F5 BIG-IP devices caused by an out-of-bounds write in the Traffic Management Microkernel (TMM). It occurs when a classification profile is configured on a virtual server without an HTTP or HTTP/2 profile, allowing certain undisclosed requests to trigger TMM termination. The vulnerability affects multiple BIG-IP versions including 15. 1. 0 through 17. 5. 0. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While no known exploits are currently in the wild, successful exploitation results in denial of service by crashing the TMM, impacting availability but not confidentiality or integrity. European organizations relying on BIG-IP for load balancing and application delivery are at risk of service disruption.
AI-Powered Analysis
Technical Analysis
CVE-2025-54479 is an out-of-bounds write vulnerability classified under CWE-787 that affects the Traffic Management Microkernel (TMM) component of F5 BIG-IP devices. The flaw is triggered when a classification profile is configured on a virtual server that lacks an HTTP or HTTP/2 profile. Under these conditions, specially crafted, undisclosed network requests can cause the TMM process to terminate unexpectedly. This termination leads to a denial of service condition, disrupting the load balancing and application delivery functions of the BIG-IP device. The vulnerability affects multiple versions of BIG-IP, specifically 15.1.0, 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported and not end-of-support. The CVSS v3.1 base score of 7.5 indicates a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability arises from improper bounds checking in the TMM when processing certain classification profiles, leading to memory corruption and process crash. This flaw can be exploited remotely without authentication, making it a significant risk for organizations using BIG-IP devices as critical network infrastructure components.
Potential Impact
The primary impact of CVE-2025-54479 is a denial of service (DoS) condition caused by the termination of the TMM process on affected BIG-IP devices. For European organizations, this can lead to significant service disruptions, especially for those relying on BIG-IP for load balancing, application delivery, and security functions such as web application firewalls and SSL offloading. The loss of availability can affect critical business applications, customer-facing services, and internal operations. Since the vulnerability does not impact confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, the disruption of network services can have cascading effects, including loss of productivity, reputational damage, and potential regulatory compliance issues under frameworks like GDPR if service outages affect personal data processing. The ease of exploitation without authentication and user interaction increases the risk of opportunistic attacks, particularly in environments exposed to the internet. Organizations with high availability requirements or those operating in sectors such as finance, telecommunications, and government are especially vulnerable to operational impacts.
Mitigation Recommendations
To mitigate CVE-2025-54479, European organizations should immediately review their BIG-IP virtual server configurations to ensure that classification profiles are not applied without an accompanying HTTP or HTTP/2 profile. This configuration check can prevent the triggering of the out-of-bounds write condition. Network segmentation and limiting exposure of BIG-IP management and data plane interfaces to untrusted networks can reduce the attack surface. Organizations should monitor vendor advisories closely for the release of official patches or updates addressing this vulnerability and plan for prompt deployment. Implementing robust network intrusion detection and prevention systems (IDS/IPS) with signatures targeting anomalous traffic patterns related to this vulnerability can provide additional protection. Regular backups and failover configurations should be tested to ensure rapid recovery in case of service disruption. Additionally, logging and alerting on TMM process crashes can help detect attempted exploitation. Finally, organizations should consider engaging with F5 support or professional services for tailored guidance and to verify the security posture of their BIG-IP deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:37.974Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99327d7577a1800406a
Added to database: 10/15/2025, 2:02:59 PM
Last enriched: 10/23/2025, 1:04:55 AM
Last updated: 11/30/2025, 10:16:36 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13786: Code Injection in taosir WTCMS
MediumCVE-2025-13785: Information Disclosure in yungifez Skuul School Management System
MediumCVE-2025-13784: Cross Site Scripting in yungifez Skuul School Management System
MediumCVE-2025-13783: SQL Injection in taosir WTCMS
MediumCVE-2025-66433: CWE-863 Incorrect Authorization in wisc HTCondor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.