Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54854: CWE-125 Out-of-bounds Read in F5 BIG-IP

0
High
VulnerabilityCVE-2025-54854cvecve-2025-54854cwe-125
Published: Wed Oct 15 2025 (10/15/2025, 13:55:53 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP APM OAuth access profile (Resource Server or Resource Client) is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:34:56 UTC

Technical Analysis

CVE-2025-54854 is an out-of-bounds read vulnerability classified under CWE-125 found in the F5 BIG-IP Application Policy Manager (APM) component when an OAuth access profile (either Resource Server or Resource Client) is configured on a virtual server. The vulnerability arises due to improper bounds checking when processing certain crafted network traffic, which leads to the apmd process terminating unexpectedly. This termination results in a denial-of-service condition affecting the availability of the BIG-IP device's access management functionality. The affected versions include 15.1.0, 16.1.0, 17.1.0, and 17.5.0, which are actively supported releases. The vulnerability can be exploited remotely without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity primarily due to the impact on availability (A:H) and ease of exploitation (AV:N/AC:L/PR:N/UI:N). No confidentiality or integrity impacts are noted. The vulnerability does not affect versions beyond end of technical support. As of the publication date, no public exploits or patches have been disclosed. The vulnerability could disrupt critical access control and traffic management services provided by BIG-IP devices, potentially affecting enterprise and service provider networks.

Potential Impact

The primary impact of CVE-2025-54854 is denial of service caused by the termination of the apmd process on affected BIG-IP devices. This can disrupt access management and OAuth-based authentication flows, potentially preventing legitimate users from accessing protected resources. Organizations relying on BIG-IP for secure remote access, VPN termination, or API gateway functions may experience service outages or degraded security posture. The vulnerability does not expose confidential data or allow unauthorized access but can significantly impact operational continuity. Large enterprises, cloud providers, and service providers using BIG-IP in their network infrastructure could face downtime, affecting business operations and customer trust. The ease of remote exploitation without authentication increases the risk of automated attacks or scanning by threat actors. Although no known exploits exist yet, the high severity and widespread deployment of BIG-IP devices make this a critical issue to address promptly.

Mitigation Recommendations

Organizations should immediately inventory their F5 BIG-IP devices to identify affected versions (15.1.0, 16.1.0, 17.1.0, 17.5.0) with OAuth access profiles configured on virtual servers. Until an official patch is released, consider the following mitigations: 1) Restrict network access to the vulnerable virtual servers by implementing strict firewall rules or network segmentation to limit exposure to untrusted sources. 2) Monitor BIG-IP system logs and the apmd process for abnormal terminations or crashes that may indicate exploitation attempts. 3) Disable or temporarily remove OAuth access profiles on virtual servers if feasible, to eliminate the attack vector. 4) Engage with F5 support for any available workarounds or hotfixes. 5) Implement robust incident response procedures to quickly detect and recover from potential denial-of-service events. 6) Plan for timely patching once F5 releases an official update addressing this vulnerability. Avoid exposing BIG-IP management interfaces or critical virtual servers directly to the internet without additional protective controls such as VPNs or zero-trust access models.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:43.573Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a18004092

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 2/27/2026, 5:34:56 AM

Last updated: 3/21/2026, 2:15:05 AM

Views: 154

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses