CVE-2025-54858: CWE-674 Uncontrolled Recursion in F5 BIG-IP
CVE-2025-54858 is a high-severity vulnerability in F5 BIG-IP Advanced WAF and ASM when configured with a JSON content profile containing a malformed JSON schema. Exploiting this vulnerability can cause the bd process to terminate, leading to denial of service. The flaw arises from uncontrolled recursion triggered by malformed JSON schemas applied to virtual servers. No authentication or user interaction is required, and the attack can be launched remotely over the network. Affected versions include 15. 1. 0, 16. 1. 0, 17. 1.
AI Analysis
Technical Summary
CVE-2025-54858 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting F5 BIG-IP devices running Advanced WAF or ASM modules. The issue occurs when a security policy is configured with a JSON content profile that includes a malformed JSON schema. When such a policy is applied to a virtual server, specially crafted requests containing malformed JSON can trigger uncontrolled recursion within the bd process, causing it to terminate unexpectedly. This results in a denial of service condition impacting the availability of the BIG-IP device's security functions. The vulnerability affects multiple recent versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0) and does not require any authentication or user interaction to exploit, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the impact on availability (A:H) and the ease of exploitation (AV:N/AC:L/PR:N/UI:N). Although no public exploits have been reported yet, the vulnerability could be leveraged by attackers to disrupt critical application delivery and security services provided by BIG-IP devices. The issue is particularly concerning for organizations that rely heavily on BIG-IP for web application firewalling and security policy enforcement, as the termination of the bd process could lead to service outages or degraded security postures. The vendor has not yet released patches, and software versions that have reached End of Technical Support are not evaluated for this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-54858 can be significant, especially for those using F5 BIG-IP devices to protect critical web applications and infrastructure. The vulnerability can cause denial of service by crashing the bd process, potentially leading to downtime of security policies and exposing applications to unfiltered traffic or service interruptions. This can affect sectors such as finance, healthcare, government, and telecommunications, where BIG-IP devices are commonly deployed for application delivery and security. Disruptions could result in operational losses, regulatory compliance issues (e.g., GDPR implications if service availability is compromised), and reputational damage. Additionally, the ease of remote exploitation without authentication increases the risk of opportunistic attacks. Organizations with complex JSON content profiles in their security policies are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the threat landscape could evolve rapidly once exploit code becomes available.
Mitigation Recommendations
1. Immediately review and validate all JSON content profiles and schemas used in BIG-IP Advanced WAF and ASM configurations to ensure they are well-formed and free of errors that could trigger recursion. 2. Monitor the bd process and system logs for abnormal terminations or crashes that could indicate exploitation attempts. 3. Implement network-level protections such as rate limiting and filtering to reduce exposure to malformed JSON payloads from untrusted sources. 4. Restrict access to BIG-IP management and virtual servers to trusted networks and enforce strict access controls. 5. Stay informed on vendor advisories and apply official patches or updates as soon as they become available. 6. Consider deploying redundancy and failover mechanisms to maintain service availability in case of bd process failure. 7. Conduct internal penetration testing focusing on malformed JSON inputs to identify potential weaknesses. 8. Document and test incident response procedures for denial of service events related to BIG-IP devices. These steps go beyond generic advice by focusing on configuration hygiene, proactive monitoring, and network-level defenses tailored to the nature of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-54858: CWE-674 Uncontrolled Recursion in F5 BIG-IP
Description
CVE-2025-54858 is a high-severity vulnerability in F5 BIG-IP Advanced WAF and ASM when configured with a JSON content profile containing a malformed JSON schema. Exploiting this vulnerability can cause the bd process to terminate, leading to denial of service. The flaw arises from uncontrolled recursion triggered by malformed JSON schemas applied to virtual servers. No authentication or user interaction is required, and the attack can be launched remotely over the network. Affected versions include 15. 1. 0, 16. 1. 0, 17. 1.
AI-Powered Analysis
Technical Analysis
CVE-2025-54858 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting F5 BIG-IP devices running Advanced WAF or ASM modules. The issue occurs when a security policy is configured with a JSON content profile that includes a malformed JSON schema. When such a policy is applied to a virtual server, specially crafted requests containing malformed JSON can trigger uncontrolled recursion within the bd process, causing it to terminate unexpectedly. This results in a denial of service condition impacting the availability of the BIG-IP device's security functions. The vulnerability affects multiple recent versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0) and does not require any authentication or user interaction to exploit, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the impact on availability (A:H) and the ease of exploitation (AV:N/AC:L/PR:N/UI:N). Although no public exploits have been reported yet, the vulnerability could be leveraged by attackers to disrupt critical application delivery and security services provided by BIG-IP devices. The issue is particularly concerning for organizations that rely heavily on BIG-IP for web application firewalling and security policy enforcement, as the termination of the bd process could lead to service outages or degraded security postures. The vendor has not yet released patches, and software versions that have reached End of Technical Support are not evaluated for this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-54858 can be significant, especially for those using F5 BIG-IP devices to protect critical web applications and infrastructure. The vulnerability can cause denial of service by crashing the bd process, potentially leading to downtime of security policies and exposing applications to unfiltered traffic or service interruptions. This can affect sectors such as finance, healthcare, government, and telecommunications, where BIG-IP devices are commonly deployed for application delivery and security. Disruptions could result in operational losses, regulatory compliance issues (e.g., GDPR implications if service availability is compromised), and reputational damage. Additionally, the ease of remote exploitation without authentication increases the risk of opportunistic attacks. Organizations with complex JSON content profiles in their security policies are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the threat landscape could evolve rapidly once exploit code becomes available.
Mitigation Recommendations
1. Immediately review and validate all JSON content profiles and schemas used in BIG-IP Advanced WAF and ASM configurations to ensure they are well-formed and free of errors that could trigger recursion. 2. Monitor the bd process and system logs for abnormal terminations or crashes that could indicate exploitation attempts. 3. Implement network-level protections such as rate limiting and filtering to reduce exposure to malformed JSON payloads from untrusted sources. 4. Restrict access to BIG-IP management and virtual servers to trusted networks and enforce strict access controls. 5. Stay informed on vendor advisories and apply official patches or updates as soon as they become available. 6. Consider deploying redundancy and failover mechanisms to maintain service availability in case of bd process failure. 7. Conduct internal penetration testing focusing on malformed JSON inputs to identify potential weaknesses. 8. Document and test incident response procedures for denial of service events related to BIG-IP devices. These steps go beyond generic advice by focusing on configuration hygiene, proactive monitoring, and network-level defenses tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:38.066Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99427d7577a18004095
Added to database: 10/15/2025, 2:03:00 PM
Last enriched: 10/23/2025, 1:05:48 AM
Last updated: 12/1/2025, 10:47:49 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8045: CWE-416 Use After Free in Arm Ltd Valhall GPU Kernel Driver
UnknownCVE-2025-6349: CWE-416 Use After Free in Arm Ltd Valhall GPU Kernel Driver
UnknownCVE-2025-59789: CWE-674 Uncontrolled Recursion in Apache Software Foundation Apache bRPC
UnknownCVE-2025-2879: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Arm Ltd Valhall GPU Kernel Driver
UnknownCVE-2025-41739: CWE-125 Out-of-bounds Read in CODESYS CODESYS PLCHandler
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.