Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58071: CWE-457: Use of Uninitialized Variable in F5 BIG-IP

0
High
VulnerabilityCVE-2025-58071cvecve-2025-58071cwe-457
Published: Wed Oct 15 2025 (10/15/2025, 15:19:46 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When IPsec is configured on the BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:38:47 UTC

Technical Analysis

CVE-2025-58071 is a vulnerability identified in the F5 BIG-IP product line, specifically affecting versions 15.1.0, 16.1.0, 17.1.0, and 17.5.0. The issue stems from a use of an uninitialized variable (CWE-457) within the Traffic Management Microkernel (TMM) component when IPsec is configured. This flaw can be triggered by sending specially crafted, undisclosed network traffic to the affected system, causing the TMM process to terminate unexpectedly. The TMM is a core component responsible for managing traffic and enforcing policies on BIG-IP devices, so its termination results in a denial-of-service (DoS) condition, disrupting network traffic management and potentially impacting availability of services relying on the BIG-IP system. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits have been reported in the wild yet, but the ease of exploitation and critical role of BIG-IP devices in enterprise and service provider networks make this a significant threat. The vulnerability does not affect versions that have reached End of Technical Support (EoTS). As of the published date, no patches have been released, but organizations should expect vendor updates soon.

Potential Impact

The primary impact of CVE-2025-58071 is a denial-of-service condition caused by the termination of the TMM process on BIG-IP devices configured with IPsec. This can lead to network outages, disruption of security services such as VPNs, load balancing, and application delivery, and potential downtime for critical business applications. Organizations that rely heavily on BIG-IP for secure remote access, traffic management, or as a security gateway may experience significant operational impact. The vulnerability can be exploited remotely without authentication or user interaction, increasing the risk of widespread attacks. While confidentiality and integrity are not directly affected, the loss of availability can indirectly impact business continuity and service level agreements. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability’s characteristics make it a likely target once exploit code becomes available. The impact is especially critical for sectors such as finance, telecommunications, government, and healthcare, where BIG-IP devices are commonly deployed and high availability is essential.

Mitigation Recommendations

1. Monitor network traffic for unusual or malformed packets targeting IPsec interfaces on BIG-IP devices to detect potential exploitation attempts. 2. Restrict access to IPsec-configured BIG-IP interfaces using network segmentation and firewall rules to limit exposure to untrusted networks. 3. Implement rate limiting or traffic filtering to reduce the risk of triggering the vulnerability via undisclosed traffic patterns. 4. Maintain up-to-date backups and disaster recovery plans to quickly restore services in case of TMM crashes. 5. Apply vendor patches and updates as soon as they become available; coordinate with F5 support for early access or workarounds. 6. Consider temporarily disabling IPsec configurations if feasible and if the risk outweighs operational needs until a patch is applied. 7. Conduct thorough testing of BIG-IP devices in a controlled environment to understand the impact of the vulnerability and validate mitigation controls. 8. Stay informed through F5 security advisories and trusted threat intelligence sources for updates on exploit availability and mitigation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-06T23:17:24.102Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efbf6451297e5c13a00149

Added to database: 10/15/2025, 3:36:04 PM

Last enriched: 2/27/2026, 5:38:47 AM

Last updated: 3/25/2026, 4:32:28 AM

Views: 203

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses