Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58096: CWE-787 Out-of-bounds Write in F5 BIG-IP

0
High
VulnerabilityCVE-2025-58096cvecve-2025-58096cwe-787
Published: Wed Oct 15 2025 (10/15/2025, 13:55:52 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When the database variable tm.tcpudptxchecksum is configured as non-default value Software-only on a BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:39:06 UTC

Technical Analysis

CVE-2025-58096 is an out-of-bounds write vulnerability classified under CWE-787 found in the F5 BIG-IP Traffic Management Microkernel (TMM). The issue arises specifically when the database variable tm.tcpudptxchecksum is configured to the non-default setting 'Software-only'. Under this configuration, certain crafted or undisclosed network traffic can cause the TMM process to perform an out-of-bounds write operation, leading to its termination. This results in a denial-of-service condition as the TMM is responsible for managing network traffic and load balancing functions on BIG-IP devices. The vulnerability affects multiple versions of BIG-IP, including 15.1.0, 16.1.0, 17.1.0, and 17.5.0, but excludes versions that have reached End of Technical Support. The CVSS v3.1 score is 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no official patches have been published yet. The vulnerability is significant because BIG-IP devices are widely used in enterprise and service provider networks for critical traffic management, making any disruption potentially impactful.

Potential Impact

The primary impact of CVE-2025-58096 is denial of service due to the termination of the Traffic Management Microkernel (TMM) on affected BIG-IP devices. This can disrupt network traffic management, load balancing, and application delivery services, potentially causing outages for critical applications and services relying on these devices. Organizations using BIG-IP in their infrastructure may experience degraded network performance or complete service interruptions. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can cause service disruptions at scale, affecting availability. Although confidentiality and integrity are not impacted, the loss of availability in critical network components can lead to operational downtime, financial losses, and reputational damage. Industries such as finance, healthcare, telecommunications, and government, which often rely heavily on BIG-IP for secure and reliable traffic management, are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits given the public disclosure.

Mitigation Recommendations

1. Review and revert the tm.tcpudptxchecksum database variable to its default setting if it is currently set to 'Software-only', unless this configuration is explicitly required for operational reasons. 2. Implement network-level protections such as ingress filtering and firewall rules to restrict access to BIG-IP management and traffic interfaces, limiting exposure to untrusted networks. 3. Monitor BIG-IP system logs and TMM process health closely for signs of unexpected terminations or crashes that may indicate exploitation attempts. 4. Engage with F5 Networks support and subscribe to their security advisories for updates on patches or official mitigations as they become available. 5. Consider deploying redundant BIG-IP devices or failover configurations to minimize service disruption in case of TMM crashes. 6. Conduct internal penetration testing or vulnerability assessments to verify the presence of this vulnerability and effectiveness of mitigations. 7. Limit exposure of BIG-IP devices to the internet or untrusted networks where possible, using VPNs or secure tunnels for remote access. 8. Prepare incident response plans specifically addressing potential denial-of-service scenarios involving BIG-IP devices to ensure rapid recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:38.077Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a180040a1

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 2/27/2026, 5:39:06 AM

Last updated: 3/28/2026, 9:16:20 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses