Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54805: CWE-401 Missing Release of Memory after Effective Lifetime in F5 BIG-IP Next SPK

0
Medium
VulnerabilityCVE-2025-54805cvecve-2025-54805cwe-401
Published: Wed Oct 15 2025 (10/15/2025, 13:55:48 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP Next SPK

Description

When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:34:42 UTC

Technical Analysis

CVE-2025-54805 is a vulnerability classified under CWE-401 (Missing Release of Memory after Effective Lifetime) affecting F5 BIG-IP Next SPK version 1.7.0. The flaw arises when an iRule is configured on a virtual server using the declarative API. Upon re-instantiation of the iRule, the cleanup process fails to properly release allocated memory within the Traffic Management Microkernel (TMM), which is responsible for handling network traffic management tasks. This memory leak causes a gradual increase in TMM's memory resource utilization, potentially leading to exhaustion of available memory resources. The vulnerability does not affect confidentiality or integrity but impacts availability by risking denial of service conditions due to resource depletion. Exploitation requires network access and privileges sufficient to configure iRules on the virtual server, but no user interaction is needed. The CVSS v3.1 base score is 6.5, reflecting medium severity with network attack vector, low attack complexity, and no privileges required beyond configuration rights. No public exploits or active exploitation have been reported to date. The vulnerability affects only version 1.7.0 of BIG-IP Next SPK, and versions that have reached End of Technical Support (EoTS) are not evaluated. No patches are currently linked, indicating that mitigation may rely on vendor updates or configuration workarounds.

Potential Impact

The primary impact of CVE-2025-54805 is on the availability of F5 BIG-IP Next SPK systems. The memory leak in the TMM component can cause progressive memory exhaustion, leading to degraded performance or complete denial of service of the virtual server managing network traffic. This can disrupt critical network services, including load balancing, application delivery, and security functions that BIG-IP devices typically provide. Organizations relying on BIG-IP Next SPK for high availability and traffic management may experience outages or degraded service quality, impacting business continuity and user experience. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, denial of service in network infrastructure can indirectly affect overall security posture by reducing defense capabilities. The requirement for privileges to configure iRules limits exploitation to insiders or attackers who have gained administrative access, reducing the likelihood of widespread exploitation but increasing risk in compromised environments.

Mitigation Recommendations

To mitigate CVE-2025-54805, organizations should first verify if they are running F5 BIG-IP Next SPK version 1.7.0 with iRules configured via the declarative API. Until a vendor patch is released, administrators should minimize re-instantiation of iRules or avoid frequent changes that trigger the cleanup process causing the memory leak. Monitoring TMM memory usage closely with automated alerts can help detect abnormal increases early. Restrict administrative access to the declarative API and iRule configuration to trusted personnel only, employing strong authentication and role-based access controls. Consider implementing network segmentation to limit exposure of management interfaces. If possible, upgrade to a later version of BIG-IP Next SPK once a fix is available or apply any vendor-provided workarounds. Regularly review F5 security advisories for updates. Additionally, conducting periodic memory usage audits and stress tests can help identify potential resource exhaustion scenarios before impacting production environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:21.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a1800408f

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 2/27/2026, 5:34:42 AM

Last updated: 3/26/2026, 11:09:32 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses