Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54854: CWE-125 Out-of-bounds Read in F5 BIG-IP

0
High
VulnerabilityCVE-2025-54854cvecve-2025-54854cwe-125
Published: Wed Oct 15 2025 (10/15/2025, 13:55:53 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-54854 is a high-severity out-of-bounds read vulnerability (CWE-125) in F5 BIG-IP devices when configured with an APM OAuth access profile on a virtual server. The flaw causes the apmd process to terminate upon receiving certain undisclosed traffic, leading to denial of service. It affects multiple BIG-IP versions including 15. 1. 0 through 17. 5. 0. No authentication or user interaction is required to exploit this remotely over the network. Although no known exploits are currently in the wild, the vulnerability’s ease of exploitation and impact on availability make it a critical concern for organizations relying on BIG-IP for access management. European organizations using these versions should prioritize patching or mitigation to prevent service disruption.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:05:33 UTC

Technical Analysis

CVE-2025-54854 is an out-of-bounds read vulnerability classified under CWE-125 affecting the F5 BIG-IP platform, specifically when an Access Policy Manager (APM) OAuth access profile (either Resource Server or Resource Client) is configured on a virtual server. The vulnerability arises due to improper bounds checking in the apmd process, which handles access management functions. When the BIG-IP device receives specially crafted, undisclosed network traffic targeting the OAuth access profile, the apmd process attempts to read memory outside of its allocated bounds. This causes the process to crash, resulting in a denial of service condition. The vulnerability affects multiple versions of BIG-IP, including 15.1.0, 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported. The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known public exploits or active exploitation have been reported yet. The vulnerability is significant because BIG-IP devices are widely deployed in enterprise and service provider environments to manage access and traffic, and disruption of the apmd process can degrade or interrupt critical access management services. Since the vulnerability can be triggered remotely without authentication, it poses a substantial risk of denial of service attacks against affected BIG-IP deployments. The lack of disclosed exploit details and patches at the time of publication requires organizations to monitor vendor advisories closely and implement interim mitigations.

Potential Impact

For European organizations, the primary impact of CVE-2025-54854 is the potential for denial of service on F5 BIG-IP devices configured with APM OAuth profiles. This can disrupt access management, VPN services, and application delivery, leading to operational downtime and potential business continuity issues. Critical sectors such as finance, telecommunications, healthcare, and government agencies that rely on BIG-IP for secure access and traffic management could experience service interruptions, impacting end users and customers. The vulnerability does not directly compromise confidentiality or integrity but the availability impact alone can cause significant operational and reputational damage. Additionally, denial of service conditions may be leveraged as part of broader multi-vector attacks or to distract security teams. Given the widespread use of F5 BIG-IP in Europe, especially in large enterprises and service providers, the risk of targeted attacks exploiting this vulnerability is considerable. Organizations may also face regulatory scrutiny if service disruptions affect data protection or critical infrastructure obligations under GDPR and NIS Directive frameworks.

Mitigation Recommendations

1. Monitor F5 Networks’ official advisories and apply security patches promptly once released for the affected BIG-IP versions. 2. Until patches are available, restrict network access to BIG-IP management and APM virtual servers using firewall rules, VPNs, or access control lists to limit exposure to untrusted networks. 3. Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) to detect and block anomalous traffic patterns targeting OAuth profiles. 4. Regularly monitor the health and logs of the apmd process for unexpected terminations or crashes to enable rapid incident response. 5. Consider deploying redundant BIG-IP devices or failover configurations to maintain availability in case of service disruption. 6. Review and harden OAuth access profile configurations to minimize attack surface, including disabling unused profiles or features. 7. Conduct internal vulnerability assessments and penetration tests focused on BIG-IP deployments to identify exposure. 8. Educate network and security teams about this vulnerability to ensure awareness and preparedness for potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:43.573Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a18004092

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/23/2025, 1:05:33 AM

Last updated: 12/4/2025, 12:52:29 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats