Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55036: CWE-787: Out-of-bounds Write in F5 BIG-IP

0
High
VulnerabilityCVE-2025-55036cvecve-2025-55036cwe-787
Published: Wed Oct 15 2025 (10/15/2025, 13:55:46 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When BIG-IP SSL Orchestrator explicit forward proxy is configured on a virtual server and the proxy connect feature is enabled, undisclosed traffic may cause memory corruption.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:36:22 UTC

Technical Analysis

CVE-2025-55036 is an out-of-bounds write vulnerability classified under CWE-787 affecting the F5 BIG-IP SSL Orchestrator product. The issue arises specifically when the explicit forward proxy is configured on a virtual server and the proxy connect feature is enabled. Under these conditions, certain undisclosed network traffic can trigger memory corruption due to improper bounds checking in the handling of proxy connect requests. This memory corruption can lead to instability or denial of service (DoS) conditions on the affected BIG-IP device. The vulnerability impacts supported versions 15.1.0, 16.1.0, and 17.1.0 of BIG-IP. The CVSS v3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact affects availability only, with no direct confidentiality or integrity impact reported. While no public exploit code or active exploitation has been observed, the vulnerability's nature and ease of exploitation make it a critical concern for organizations using BIG-IP SSL Orchestrator in proxy mode. The lack of patches at the time of disclosure necessitates immediate mitigation steps to reduce exposure. This vulnerability underscores the importance of careful configuration management and timely updates in complex network security appliances.

Potential Impact

The primary impact of CVE-2025-55036 is potential denial of service through memory corruption on F5 BIG-IP devices configured with SSL Orchestrator explicit forward proxy and proxy connect enabled. This can disrupt critical network security functions such as SSL inspection, traffic orchestration, and proxying, leading to service outages and degraded security posture. Organizations relying on BIG-IP for perimeter security, encrypted traffic management, or application delivery may experience downtime, impacting business continuity and user access. Although confidentiality and integrity are not directly compromised, the availability impact can indirectly affect security monitoring and incident response capabilities. The vulnerability's remote exploitability without authentication increases the risk of automated attacks or scanning by threat actors. Large enterprises, service providers, and government agencies using BIG-IP appliances in their network infrastructure are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the risk of future exploitation remains significant.

Mitigation Recommendations

To mitigate CVE-2025-55036, organizations should immediately review their BIG-IP SSL Orchestrator configurations and disable the proxy connect feature on virtual servers where explicit forward proxy is enabled if this feature is not essential. This reduces the attack surface by preventing the vulnerable code path from being triggered. Administrators should monitor F5's security advisories closely and apply vendor-released patches or updates as soon as they become available. In the interim, network-level controls such as filtering or rate limiting suspicious traffic patterns that could trigger the vulnerability may help reduce risk. Conducting thorough testing of BIG-IP configurations and limiting exposure of management and proxy interfaces to trusted networks can further reduce attack vectors. Additionally, organizations should implement comprehensive logging and monitoring to detect anomalous traffic or crashes indicative of exploitation attempts. Regular backups and incident response plans should be updated to prepare for potential service disruptions. Engaging with F5 support for guidance and best practices is recommended to ensure secure deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:21.079Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a18004098

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 2/27/2026, 5:36:22 AM

Last updated: 3/25/2026, 12:56:25 AM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses