Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55669: CWE-672 Operation on a Resource after Expiration or Release in F5 BIG-IP

0
High
VulnerabilityCVE-2025-55669cvecve-2025-55669cwe-672
Published: Wed Oct 15 2025 (10/15/2025, 13:55:45 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When the BIG-IP Advanced WAF and ASM security policy and a server-side HTTP/2 profile are configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:10:23 UTC

Technical Analysis

CVE-2025-55669 is a vulnerability classified under CWE-672 (Operation on a Resource after Expiration or Release) affecting F5 BIG-IP versions 16.1.0 and 17.1.0. The flaw occurs when the BIG-IP Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) policies are enabled in conjunction with a server-side HTTP/2 profile on a virtual server. Under these conditions, specially crafted or undisclosed traffic can cause the Traffic Management Microkernel (TMM)—the core component responsible for processing and managing network traffic—to terminate unexpectedly. This termination leads to a denial of service (DoS) condition, disrupting the availability of services managed by the BIG-IP device. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score of 7.5 reflects the high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability does not compromise confidentiality or integrity but solely impacts availability. No public exploits have been reported yet, and software versions beyond End of Technical Support (EoTS) are not evaluated. The absence of patch links suggests that fixes may be forthcoming or in development. The root cause relates to improper handling of resources after they have expired or been released, leading to unstable TMM behavior when processing HTTP/2 traffic under specific security policy configurations.

Potential Impact

For European organizations, the primary impact of CVE-2025-55669 is service disruption due to denial of service on F5 BIG-IP devices. These devices are widely used in enterprise and critical infrastructure environments for load balancing, application delivery, and security enforcement. A TMM crash can lead to downtime of web applications, internal services, or security gateways, potentially affecting business continuity and operational resilience. Although confidentiality and integrity are not directly impacted, availability loss can indirectly affect compliance with regulations such as GDPR, especially if services become unavailable to customers or partners. Organizations relying on BIG-IP for securing HTTP/2 traffic with Advanced WAF and ASM policies are particularly vulnerable. The lack of authentication or user interaction required for exploitation means attackers can remotely trigger the DoS, increasing the risk of automated or large-scale attacks. This could be leveraged by threat actors to disrupt services during geopolitical tensions or cyber campaigns targeting European entities. The impact is heightened in sectors such as finance, telecommunications, government, and healthcare, where BIG-IP devices are commonly deployed.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or updates addressing CVE-2025-55669 and apply them promptly once available. 2. Temporarily disable or avoid using server-side HTTP/2 profiles on virtual servers that have Advanced WAF and ASM policies enabled, if business operations allow. 3. Implement network-level protections such as rate limiting or filtering to detect and block anomalous or malformed HTTP/2 traffic that could trigger the vulnerability. 4. Regularly monitor the stability and logs of the Traffic Management Microkernel (TMM) to detect early signs of crashes or abnormal terminations. 5. Consider deploying redundant BIG-IP devices or failover configurations to minimize service disruption in case of TMM termination. 6. Conduct internal security assessments and penetration testing focusing on HTTP/2 traffic handling and WAF/ASM configurations to identify potential exploitation vectors. 7. Engage with F5 support for guidance on configuration best practices that reduce exposure to this vulnerability. 8. Ensure incident response plans include procedures for rapid recovery from BIG-IP service interruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:03.900Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a1800409b

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/15/2025, 2:10:23 PM

Last updated: 10/16/2025, 12:13:18 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats