Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55669: CWE-672 Operation on a Resource after Expiration or Release in F5 BIG-IP

0
High
VulnerabilityCVE-2025-55669cvecve-2025-55669cwe-672
Published: Wed Oct 15 2025 (10/15/2025, 13:55:45 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-55669 is a high-severity vulnerability in F5 BIG-IP devices affecting versions 16. 1. 0 and 17. 1. 0 when configured with Advanced WAF/ASM policies and server-side HTTP/2 profiles. The flaw, categorized as CWE-672, involves operations on resources after expiration or release, which can cause the Traffic Management Microkernel (TMM) to terminate unexpectedly. This results in a denial of service (DoS) condition without requiring authentication or user interaction. No known exploits are currently reported in the wild. European organizations using these BIG-IP versions in critical network infrastructure may face service disruptions. Mitigation requires careful configuration review and prompt patching once updates are available.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:06:17 UTC

Technical Analysis

CVE-2025-55669 is a vulnerability identified in F5 BIG-IP versions 16.1.0 and 17.1.0, specifically when the Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) security policies are enabled alongside a server-side HTTP/2 profile on a virtual server. The underlying issue is classified under CWE-672, which involves performing operations on resources after they have expired or been released, leading to use-after-free or similar memory management errors. In this case, specially crafted or undisclosed traffic can trigger the Traffic Management Microkernel (TMM) component of BIG-IP to terminate unexpectedly. TMM is a critical process responsible for managing traffic and enforcing security policies. Its termination results in a denial of service (DoS), disrupting network traffic and potentially causing outages for services relying on the BIG-IP device. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. Although no exploits have been reported in the wild yet, the potential for disruption is significant given the role of BIG-IP in enterprise and service provider environments. The vulnerability affects supported versions only, as versions past End of Technical Support (EoTS) are not evaluated. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the impact on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N).

Potential Impact

For European organizations, the impact of CVE-2025-55669 can be substantial, especially for those relying on F5 BIG-IP devices for critical network functions such as load balancing, application delivery, and web application security. A successful exploitation leads to the termination of the TMM process, causing denial of service and potential downtime of protected applications and services. This can disrupt business operations, degrade customer experience, and potentially violate regulatory requirements for service availability and continuity. Sectors such as finance, telecommunications, government, and healthcare, which often deploy BIG-IP for security and traffic management, are particularly vulnerable. The disruption could also affect inter-organizational communications and critical infrastructure services. Although no data confidentiality or integrity loss is indicated, the availability impact alone can have cascading effects on dependent systems and services. The lack of required authentication or user interaction increases the risk of remote exploitation by attackers scanning for vulnerable devices.

Mitigation Recommendations

1. Immediate review of BIG-IP configurations to identify virtual servers using both Advanced WAF/ASM policies and server-side HTTP/2 profiles. 2. Temporarily disable either the Advanced WAF/ASM security policies or the server-side HTTP/2 profile on affected virtual servers if feasible, to mitigate exposure until patches are available. 3. Monitor vendor communications closely for official patches or hotfixes from F5 and apply them promptly once released. 4. Implement network-level protections such as firewall rules or intrusion prevention systems to restrict access to management and critical BIG-IP interfaces from untrusted networks. 5. Employ traffic anomaly detection to identify unusual or malformed HTTP/2 traffic patterns that could trigger the vulnerability. 6. Maintain up-to-date asset inventories to quickly identify and remediate vulnerable BIG-IP instances. 7. Conduct regular backups and have incident response plans ready to address potential service disruptions. 8. Engage with F5 support for guidance on interim mitigations and best practices specific to your deployment environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:03.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a1800409b

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/23/2025, 1:06:17 AM

Last updated: 12/4/2025, 8:21:57 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats