Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54858: CWE-674 Uncontrolled Recursion in F5 BIG-IP

0
High
VulnerabilityCVE-2025-54858cvecve-2025-54858cwe-674
Published: Wed Oct 15 2025 (10/15/2025, 13:55:51 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP Advanced WAF or BIG-IP ASM Security Policy is configured with a JSON content profile that has a malformed JSON schema, and the security policy is applied to a virtual server, undisclosed requests can cause the bd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:15:22 UTC

Technical Analysis

CVE-2025-54858 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting F5 BIG-IP Advanced WAF and ASM modules. The issue arises when a security policy is configured with a JSON content profile that includes a malformed JSON schema. When such a policy is applied to a virtual server, specially crafted requests can trigger uncontrolled recursion within the bd process, leading to its termination. This termination causes a denial of service condition, disrupting the availability of the BIG-IP service. The vulnerability affects multiple supported versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0). The CVSS v3.1 score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity compromise reported. No public exploits have been observed yet, but the vulnerability is publicly disclosed and documented. The root cause is improper handling of malformed JSON schemas leading to uncontrolled recursion in the processing logic of the bd process, which is critical for BIG-IP’s security policy enforcement. The vulnerability does not affect versions that have reached End of Technical Support. No official patches or workarounds are listed in the provided data, emphasizing the need for configuration review and monitoring.

Potential Impact

For European organizations, the primary impact of CVE-2025-54858 is a denial of service condition on F5 BIG-IP devices running Advanced WAF or ASM with vulnerable JSON content profiles. This can lead to temporary unavailability of web application firewall protections and potentially the virtual servers behind them, increasing exposure to other attacks during downtime. Organizations relying on BIG-IP for critical web infrastructure, including financial institutions, government agencies, and large enterprises, may experience service interruptions affecting business continuity and customer trust. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational disruption risk. Given the network-exploitable nature and no authentication requirement, attackers can remotely trigger the vulnerability, making it a significant threat in hostile environments. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future exploitation. European sectors with high dependence on BIG-IP appliances for web security are particularly vulnerable to service degradation or outages.

Mitigation Recommendations

1. Immediately audit all BIG-IP Advanced WAF and ASM security policies that utilize JSON content profiles to identify any malformed or non-standard JSON schemas. 2. Correct or remove malformed JSON schemas from security policies to prevent triggering uncontrolled recursion. 3. Monitor the bd process and BIG-IP system logs for unusual terminations or crashes indicative of exploitation attempts. 4. Implement network-level protections such as rate limiting and IP reputation filtering to reduce exposure to malicious requests targeting this vulnerability. 5. Engage with F5 support or check official advisories regularly for patches or updates addressing CVE-2025-54858 and apply them promptly once available. 6. Consider deploying BIG-IP devices in high-availability configurations to mitigate potential downtime caused by process termination. 7. Conduct penetration testing and fuzzing on JSON content profiles to proactively detect malformed schema issues. 8. Restrict management and configuration access to trusted administrators to prevent accidental deployment of malformed schemas. These steps go beyond generic advice by focusing on configuration hygiene, proactive monitoring, and operational resilience specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:38.066Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a18004095

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/15/2025, 2:15:22 PM

Last updated: 10/16/2025, 12:21:06 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats