Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54755: CWE-146: Improper Neutralization of Expression/Command Delimiters in F5 BIG-IP

0
Medium
VulnerabilityCVE-2025-54755cvecve-2025-54755cwe-146
Published: Wed Oct 15 2025 (10/15/2025, 13:55:55 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

A directory traversal vulnerability exists in TMUI that allows an authenticated attacker to access files which are not limited to the intended files.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/23/2025, 00:56:43 UTC

Technical Analysis

CVE-2025-54755 is a directory traversal vulnerability identified in the Traffic Management User Interface (TMUI) component of F5 BIG-IP devices. The vulnerability stems from improper neutralization of expression or command delimiters (CWE-146), allowing an authenticated attacker with high privileges to bypass intended file access restrictions and read arbitrary files on the system. This can lead to exposure of sensitive configuration files, credentials, or other critical data stored on the device. The affected BIG-IP versions include 15.1.0, 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported and in use. The vulnerability requires network access to the TMUI interface and valid user credentials with elevated privileges, but does not require user interaction beyond authentication. The CVSS v3.1 base score is 4.9, reflecting medium severity due to the confidentiality impact and the requirement for authentication. No public exploits have been reported yet, but the vulnerability could be leveraged in targeted attacks against organizations relying on BIG-IP for load balancing, application delivery, and security functions. The flaw arises because the TMUI fails to properly sanitize input used in file path expressions, enabling directory traversal sequences that access files outside the intended directories. This can undermine the confidentiality of the system and potentially aid further attacks if sensitive files such as private keys or configuration data are exposed. The vulnerability does not impact integrity or availability directly. Since the TMUI is often exposed to internal networks or VPNs, attackers with legitimate access could exploit this flaw to escalate their access or gather intelligence.

Potential Impact

For European organizations, the impact of CVE-2025-54755 is primarily the unauthorized disclosure of sensitive information stored on F5 BIG-IP devices. This could include configuration files, credentials, SSL private keys, or other critical data that could facilitate further compromise or lateral movement within networks. Given the widespread use of F5 BIG-IP in enterprise data centers, telecommunications, and government infrastructure across Europe, exploitation could lead to significant confidentiality breaches. Organizations in sectors such as finance, healthcare, telecommunications, and critical infrastructure are particularly at risk due to the sensitive nature of their data and reliance on BIG-IP for secure application delivery. The vulnerability requires authenticated access, which limits exposure to insider threats or attackers who have already compromised credentials. However, if credentials are phished or stolen, attackers could leverage this vulnerability to deepen their foothold. The lack of known exploits in the wild suggests limited immediate risk, but the medium severity rating and potential impact warrant prompt attention. Failure to address this vulnerability could result in regulatory compliance issues under GDPR if personal data is exposed, as well as reputational damage and operational risks.

Mitigation Recommendations

1. Apply official patches or updates from F5 as soon as they become available to remediate the vulnerability. 2. Restrict access to the TMUI interface by implementing network segmentation and firewall rules to limit access only to trusted administrative hosts and networks. 3. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all users accessing the TMUI to reduce the risk of credential compromise. 4. Regularly audit and monitor access logs for unusual or unauthorized access attempts to the TMUI interface. 5. Use role-based access control (RBAC) to minimize the number of users with high privileges capable of exploiting this vulnerability. 6. Conduct internal penetration testing and vulnerability scanning to identify any exposure of TMUI interfaces and verify mitigation effectiveness. 7. Educate administrators on phishing and credential security best practices to prevent attackers from gaining authenticated access. 8. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) that can detect and block directory traversal attempts targeting TMUI. 9. Maintain an inventory of all BIG-IP devices and their versions to ensure timely patch management. 10. If patching is delayed, consider temporarily disabling TMUI access or isolating affected devices from untrusted networks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:43.617Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a1800408c

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/23/2025, 12:56:43 AM

Last updated: 12/4/2025, 3:33:00 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats