Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54479: CWE-787: Out-of-bounds Write in F5 BIG-IP

0
High
VulnerabilityCVE-2025-54479cvecve-2025-54479cwe-787
Published: Wed Oct 15 2025 (10/15/2025, 13:55:49 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-54479 is a high-severity vulnerability in F5 BIG-IP devices caused by an out-of-bounds write in the Traffic Management Microkernel (TMM). It occurs when a classification profile is configured on a virtual server without an HTTP or HTTP/2 profile, allowing certain undisclosed requests to trigger TMM termination. The vulnerability affects multiple BIG-IP versions including 15. 1. 0 through 17. 5. 0. Exploitation requires no authentication or user interaction and can be performed remotely over the network. While no known exploits are currently in the wild, successful exploitation results in denial of service by crashing the TMM, impacting availability but not confidentiality or integrity. European organizations relying on BIG-IP for load balancing and application delivery are at risk of service disruption.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:04:55 UTC

Technical Analysis

CVE-2025-54479 is an out-of-bounds write vulnerability classified under CWE-787 that affects the Traffic Management Microkernel (TMM) component of F5 BIG-IP devices. The flaw is triggered when a classification profile is configured on a virtual server that lacks an HTTP or HTTP/2 profile. Under these conditions, specially crafted, undisclosed network requests can cause the TMM process to terminate unexpectedly. This termination leads to a denial of service condition, disrupting the load balancing and application delivery functions of the BIG-IP device. The vulnerability affects multiple versions of BIG-IP, specifically 15.1.0, 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported and not end-of-support. The CVSS v3.1 base score of 7.5 indicates a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability arises from improper bounds checking in the TMM when processing certain classification profiles, leading to memory corruption and process crash. This flaw can be exploited remotely without authentication, making it a significant risk for organizations using BIG-IP devices as critical network infrastructure components.

Potential Impact

The primary impact of CVE-2025-54479 is a denial of service (DoS) condition caused by the termination of the TMM process on affected BIG-IP devices. For European organizations, this can lead to significant service disruptions, especially for those relying on BIG-IP for load balancing, application delivery, and security functions such as web application firewalls and SSL offloading. The loss of availability can affect critical business applications, customer-facing services, and internal operations. Since the vulnerability does not impact confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, the disruption of network services can have cascading effects, including loss of productivity, reputational damage, and potential regulatory compliance issues under frameworks like GDPR if service outages affect personal data processing. The ease of exploitation without authentication and user interaction increases the risk of opportunistic attacks, particularly in environments exposed to the internet. Organizations with high availability requirements or those operating in sectors such as finance, telecommunications, and government are especially vulnerable to operational impacts.

Mitigation Recommendations

To mitigate CVE-2025-54479, European organizations should immediately review their BIG-IP virtual server configurations to ensure that classification profiles are not applied without an accompanying HTTP or HTTP/2 profile. This configuration check can prevent the triggering of the out-of-bounds write condition. Network segmentation and limiting exposure of BIG-IP management and data plane interfaces to untrusted networks can reduce the attack surface. Organizations should monitor vendor advisories closely for the release of official patches or updates addressing this vulnerability and plan for prompt deployment. Implementing robust network intrusion detection and prevention systems (IDS/IPS) with signatures targeting anomalous traffic patterns related to this vulnerability can provide additional protection. Regular backups and failover configurations should be tested to ensure rapid recovery in case of service disruption. Additionally, logging and alerting on TMM process crashes can help detect attempted exploitation. Finally, organizations should consider engaging with F5 support or professional services for tailored guidance and to verify the security posture of their BIG-IP deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:37.974Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99327d7577a1800406a

Added to database: 10/15/2025, 2:02:59 PM

Last enriched: 10/23/2025, 1:04:55 AM

Last updated: 11/30/2025, 10:16:36 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats