Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54755: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in F5 BIG-IP

0
Medium
VulnerabilityCVE-2025-54755cvecve-2025-54755cwe-22
Published: Wed Oct 15 2025 (10/15/2025, 13:55:55 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

A directory traversal vulnerability exists in TMUI that allows a highly privileged authenticated attacker to access files which are not limited to the intended files.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:18:16 UTC

Technical Analysis

CVE-2025-54755 is a path traversal vulnerability categorized under CWE-22, affecting the Traffic Management User Interface (TMUI) of F5 BIG-IP devices. This vulnerability arises from improper limitation of pathname inputs, allowing a highly privileged authenticated attacker to traverse directories and access files beyond the intended restricted directory. The flaw exists in multiple recent versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0), which are widely used for load balancing, application delivery, and security services in enterprise and service provider networks. Exploitation requires the attacker to have high-level privileges and network access to the TMUI interface, but does not require user interaction. The vulnerability primarily impacts confidentiality by exposing sensitive files that could contain configuration data, credentials, or other critical information. The CVSS v3.1 base score is 4.9, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No public exploits or patches are currently available, increasing the importance of proactive mitigation. Given the critical role of BIG-IP devices in network infrastructure, successful exploitation could lead to significant information disclosure, aiding further attacks or lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-54755 can be significant, especially for those relying on F5 BIG-IP devices to secure and manage critical network traffic and applications. Unauthorized access to sensitive files could expose configuration details, credentials, or cryptographic keys, potentially enabling attackers to escalate privileges, bypass security controls, or conduct further intrusions. This risk is heightened in sectors such as finance, telecommunications, government, and critical infrastructure, where BIG-IP devices are commonly deployed. The confidentiality breach could lead to regulatory non-compliance under GDPR, resulting in legal and financial penalties. Although the vulnerability does not directly affect system integrity or availability, the information disclosure could facilitate more damaging attacks. The requirement for high privileges limits the attack surface but insider threats or compromised administrative accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk but also means organizations should act preemptively to avoid future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-54755, European organizations should implement the following specific measures: 1) Restrict network access to the TMUI interface strictly to trusted administrative hosts using network segmentation, firewalls, and VPNs. 2) Enforce strong multi-factor authentication and least privilege principles for all users with access to TMUI to reduce the risk of credential compromise. 3) Monitor and audit all privileged user activities on BIG-IP devices for unusual or unauthorized file access attempts. 4) Disable or limit TMUI access if not required for operational purposes. 5) Stay in close contact with F5 Networks for official patches or updates addressing this vulnerability and apply them promptly once available. 6) Conduct internal vulnerability assessments and penetration tests focusing on BIG-IP devices to identify potential exploitation paths. 7) Implement file integrity monitoring on BIG-IP systems to detect unauthorized changes or access. These steps go beyond generic advice by focusing on access control, monitoring, and proactive patch management tailored to the specific nature of the vulnerability and the operational context of BIG-IP deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:43.617Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a1800408c

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 1/24/2026, 7:18:16 PM

Last updated: 2/7/2026, 8:47:37 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats