CVE-2025-54755: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in F5 BIG-IP
A directory traversal vulnerability exists in TMUI that allows a highly privileged authenticated attacker to access files which are not limited to the intended files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-54755 is a path traversal vulnerability categorized under CWE-22, affecting the Traffic Management User Interface (TMUI) of F5 BIG-IP devices. This vulnerability arises from improper limitation of pathname inputs, allowing a highly privileged authenticated attacker to traverse directories and access files beyond the intended restricted directory. The flaw exists in multiple recent versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0), which are widely used for load balancing, application delivery, and security services in enterprise and service provider networks. Exploitation requires the attacker to have high-level privileges and network access to the TMUI interface, but does not require user interaction. The vulnerability primarily impacts confidentiality by exposing sensitive files that could contain configuration data, credentials, or other critical information. The CVSS v3.1 base score is 4.9, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No public exploits or patches are currently available, increasing the importance of proactive mitigation. Given the critical role of BIG-IP devices in network infrastructure, successful exploitation could lead to significant information disclosure, aiding further attacks or lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-54755 can be significant, especially for those relying on F5 BIG-IP devices to secure and manage critical network traffic and applications. Unauthorized access to sensitive files could expose configuration details, credentials, or cryptographic keys, potentially enabling attackers to escalate privileges, bypass security controls, or conduct further intrusions. This risk is heightened in sectors such as finance, telecommunications, government, and critical infrastructure, where BIG-IP devices are commonly deployed. The confidentiality breach could lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. Although the vulnerability does not directly affect system integrity or availability, the information disclosure could facilitate more damaging attacks. The requirement for high privileges limits the attack surface but insider threats or compromised administrative accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk but also means organizations should act preemptively to avoid future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-54755, European organizations should implement the following specific measures: 1) Restrict network access to the TMUI interface strictly to trusted administrative hosts using network segmentation, firewalls, and VPNs. 2) Enforce strong multi-factor authentication and least privilege principles for all users with access to TMUI to reduce the risk of credential compromise. 3) Monitor and audit all privileged user activities on BIG-IP devices for unusual or unauthorized file access attempts. 4) Disable or limit TMUI access if not required for operational purposes. 5) Stay in close contact with F5 Networks for official patches or updates addressing this vulnerability and apply them promptly once available. 6) Conduct internal vulnerability assessments and penetration tests focusing on BIG-IP devices to identify potential exploitation paths. 7) Implement file integrity monitoring on BIG-IP systems to detect unauthorized changes or access. These steps go beyond generic advice by focusing on access control, monitoring, and proactive patch management tailored to the specific nature of the vulnerability and the operational context of BIG-IP deployments.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-54755: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in F5 BIG-IP
Description
A directory traversal vulnerability exists in TMUI that allows a highly privileged authenticated attacker to access files which are not limited to the intended files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-54755 is a path traversal vulnerability categorized under CWE-22, affecting the Traffic Management User Interface (TMUI) of F5 BIG-IP devices. This vulnerability arises from improper limitation of pathname inputs, allowing a highly privileged authenticated attacker to traverse directories and access files beyond the intended restricted directory. The flaw exists in multiple recent versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0), which are widely used for load balancing, application delivery, and security services in enterprise and service provider networks. Exploitation requires the attacker to have high-level privileges and network access to the TMUI interface, but does not require user interaction. The vulnerability primarily impacts confidentiality by exposing sensitive files that could contain configuration data, credentials, or other critical information. The CVSS v3.1 base score is 4.9, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No public exploits or patches are currently available, increasing the importance of proactive mitigation. Given the critical role of BIG-IP devices in network infrastructure, successful exploitation could lead to significant information disclosure, aiding further attacks or lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-54755 can be significant, especially for those relying on F5 BIG-IP devices to secure and manage critical network traffic and applications. Unauthorized access to sensitive files could expose configuration details, credentials, or cryptographic keys, potentially enabling attackers to escalate privileges, bypass security controls, or conduct further intrusions. This risk is heightened in sectors such as finance, telecommunications, government, and critical infrastructure, where BIG-IP devices are commonly deployed. The confidentiality breach could lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. Although the vulnerability does not directly affect system integrity or availability, the information disclosure could facilitate more damaging attacks. The requirement for high privileges limits the attack surface but insider threats or compromised administrative accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk but also means organizations should act preemptively to avoid future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-54755, European organizations should implement the following specific measures: 1) Restrict network access to the TMUI interface strictly to trusted administrative hosts using network segmentation, firewalls, and VPNs. 2) Enforce strong multi-factor authentication and least privilege principles for all users with access to TMUI to reduce the risk of credential compromise. 3) Monitor and audit all privileged user activities on BIG-IP devices for unusual or unauthorized file access attempts. 4) Disable or limit TMUI access if not required for operational purposes. 5) Stay in close contact with F5 Networks for official patches or updates addressing this vulnerability and apply them promptly once available. 6) Conduct internal vulnerability assessments and penetration tests focusing on BIG-IP devices to identify potential exploitation paths. 7) Implement file integrity monitoring on BIG-IP systems to detect unauthorized changes or access. These steps go beyond generic advice by focusing on access control, monitoring, and proactive patch management tailored to the specific nature of the vulnerability and the operational context of BIG-IP deployments.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:43.617Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99427d7577a1800408c
Added to database: 10/15/2025, 2:03:00 PM
Last enriched: 1/24/2026, 7:18:16 PM
Last updated: 2/7/2026, 8:47:37 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.