CVE-2025-55669: CWE-672 Operation on a Resource after Expiration or Release in F5 BIG-IP
CVE-2025-55669 is a high-severity vulnerability in F5 BIG-IP devices affecting versions 16. 1. 0 and 17. 1. 0 when configured with Advanced WAF/ASM policies and server-side HTTP/2 profiles. The flaw, categorized as CWE-672, involves operations on resources after expiration or release, which can cause the Traffic Management Microkernel (TMM) to terminate unexpectedly. This results in a denial of service (DoS) condition without requiring authentication or user interaction. No known exploits are currently reported in the wild. European organizations using these BIG-IP versions in critical network infrastructure may face service disruptions. Mitigation requires careful configuration review and prompt patching once updates are available.
AI Analysis
Technical Summary
CVE-2025-55669 is a vulnerability identified in F5 BIG-IP versions 16.1.0 and 17.1.0, specifically when the Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) security policies are enabled alongside a server-side HTTP/2 profile on a virtual server. The underlying issue is classified under CWE-672, which involves performing operations on resources after they have expired or been released, leading to use-after-free or similar memory management errors. In this case, specially crafted or undisclosed traffic can trigger the Traffic Management Microkernel (TMM) component of BIG-IP to terminate unexpectedly. TMM is a critical process responsible for managing traffic and enforcing security policies. Its termination results in a denial of service (DoS), disrupting network traffic and potentially causing outages for services relying on the BIG-IP device. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. Although no exploits have been reported in the wild yet, the potential for disruption is significant given the role of BIG-IP in enterprise and service provider environments. The vulnerability affects supported versions only, as versions past End of Technical Support (EoTS) are not evaluated. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the impact on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N).
Potential Impact
For European organizations, the impact of CVE-2025-55669 can be substantial, especially for those relying on F5 BIG-IP devices for critical network functions such as load balancing, application delivery, and web application security. A successful exploitation leads to the termination of the TMM process, causing denial of service and potential downtime of protected applications and services. This can disrupt business operations, degrade customer experience, and potentially violate regulatory requirements for service availability and continuity. Sectors such as finance, telecommunications, government, and healthcare, which often deploy BIG-IP for security and traffic management, are particularly vulnerable. The disruption could also affect inter-organizational communications and critical infrastructure services. Although no data confidentiality or integrity loss is indicated, the availability impact alone can have cascading effects on dependent systems and services. The lack of required authentication or user interaction increases the risk of remote exploitation by attackers scanning for vulnerable devices.
Mitigation Recommendations
1. Immediate review of BIG-IP configurations to identify virtual servers using both Advanced WAF/ASM policies and server-side HTTP/2 profiles. 2. Temporarily disable either the Advanced WAF/ASM security policies or the server-side HTTP/2 profile on affected virtual servers if feasible, to mitigate exposure until patches are available. 3. Monitor vendor communications closely for official patches or hotfixes from F5 and apply them promptly once released. 4. Implement network-level protections such as firewall rules or intrusion prevention systems to restrict access to management and critical BIG-IP interfaces from untrusted networks. 5. Employ traffic anomaly detection to identify unusual or malformed HTTP/2 traffic patterns that could trigger the vulnerability. 6. Maintain up-to-date asset inventories to quickly identify and remediate vulnerable BIG-IP instances. 7. Conduct regular backups and have incident response plans ready to address potential service disruptions. 8. Engage with F5 support for guidance on interim mitigations and best practices specific to your deployment environment.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-55669: CWE-672 Operation on a Resource after Expiration or Release in F5 BIG-IP
Description
CVE-2025-55669 is a high-severity vulnerability in F5 BIG-IP devices affecting versions 16. 1. 0 and 17. 1. 0 when configured with Advanced WAF/ASM policies and server-side HTTP/2 profiles. The flaw, categorized as CWE-672, involves operations on resources after expiration or release, which can cause the Traffic Management Microkernel (TMM) to terminate unexpectedly. This results in a denial of service (DoS) condition without requiring authentication or user interaction. No known exploits are currently reported in the wild. European organizations using these BIG-IP versions in critical network infrastructure may face service disruptions. Mitigation requires careful configuration review and prompt patching once updates are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-55669 is a vulnerability identified in F5 BIG-IP versions 16.1.0 and 17.1.0, specifically when the Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) security policies are enabled alongside a server-side HTTP/2 profile on a virtual server. The underlying issue is classified under CWE-672, which involves performing operations on resources after they have expired or been released, leading to use-after-free or similar memory management errors. In this case, specially crafted or undisclosed traffic can trigger the Traffic Management Microkernel (TMM) component of BIG-IP to terminate unexpectedly. TMM is a critical process responsible for managing traffic and enforcing security policies. Its termination results in a denial of service (DoS), disrupting network traffic and potentially causing outages for services relying on the BIG-IP device. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. Although no exploits have been reported in the wild yet, the potential for disruption is significant given the role of BIG-IP in enterprise and service provider environments. The vulnerability affects supported versions only, as versions past End of Technical Support (EoTS) are not evaluated. The CVSS v3.1 base score is 7.5, reflecting a high severity primarily due to the impact on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N).
Potential Impact
For European organizations, the impact of CVE-2025-55669 can be substantial, especially for those relying on F5 BIG-IP devices for critical network functions such as load balancing, application delivery, and web application security. A successful exploitation leads to the termination of the TMM process, causing denial of service and potential downtime of protected applications and services. This can disrupt business operations, degrade customer experience, and potentially violate regulatory requirements for service availability and continuity. Sectors such as finance, telecommunications, government, and healthcare, which often deploy BIG-IP for security and traffic management, are particularly vulnerable. The disruption could also affect inter-organizational communications and critical infrastructure services. Although no data confidentiality or integrity loss is indicated, the availability impact alone can have cascading effects on dependent systems and services. The lack of required authentication or user interaction increases the risk of remote exploitation by attackers scanning for vulnerable devices.
Mitigation Recommendations
1. Immediate review of BIG-IP configurations to identify virtual servers using both Advanced WAF/ASM policies and server-side HTTP/2 profiles. 2. Temporarily disable either the Advanced WAF/ASM security policies or the server-side HTTP/2 profile on affected virtual servers if feasible, to mitigate exposure until patches are available. 3. Monitor vendor communications closely for official patches or hotfixes from F5 and apply them promptly once released. 4. Implement network-level protections such as firewall rules or intrusion prevention systems to restrict access to management and critical BIG-IP interfaces from untrusted networks. 5. Employ traffic anomaly detection to identify unusual or malformed HTTP/2 traffic patterns that could trigger the vulnerability. 6. Maintain up-to-date asset inventories to quickly identify and remediate vulnerable BIG-IP instances. 7. Conduct regular backups and have incident response plans ready to address potential service disruptions. 8. Engage with F5 support for guidance on interim mitigations and best practices specific to your deployment environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:03.900Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99427d7577a1800409b
Added to database: 10/15/2025, 2:03:00 PM
Last enriched: 10/23/2025, 1:06:17 AM
Last updated: 12/4/2025, 8:21:57 AM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.