CVE-2025-58120: CWE-476 NULL Pointer Dereference in F5 BIG-IP Next SPK
When HTTP/2 Ingress is configured, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-58120 is a vulnerability identified in F5 BIG-IP Next SPK, specifically affecting versions 1.7.0, 1.8.0, 1.9.0, and 2.0.0. The flaw is a NULL pointer dereference (CWE-476) that occurs when HTTP/2 Ingress is enabled and certain undisclosed traffic is received by the Traffic Management Microkernel (TMM). The TMM is a core component responsible for managing network traffic and load balancing within the BIG-IP platform. When the vulnerability is triggered, the TMM process terminates unexpectedly, causing a denial of service (DoS) by disrupting traffic management functions. The vulnerability can be exploited remotely without any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The CVSS 3.1 base score of 7.5 reflects the high impact on availability (A:H) with no impact on confidentiality or integrity, and the attack vector is network-based with low attack complexity. Although no public exploits have been reported yet, the critical role of BIG-IP devices in enterprise and service provider networks makes this vulnerability a significant concern. The lack of available patches at the time of publication necessitates immediate risk mitigation and monitoring by affected organizations.
Potential Impact
The primary impact of CVE-2025-58120 is a denial of service condition caused by the termination of the TMM process on affected F5 BIG-IP Next SPK devices. This disruption can lead to network traffic management failures, resulting in service outages for applications and services relying on BIG-IP for load balancing, security, and traffic routing. Organizations using these devices in critical infrastructure, cloud environments, or enterprise networks may experience degraded network performance or complete loss of service availability. The vulnerability does not directly compromise data confidentiality or integrity but can indirectly affect business operations and service continuity. Given the widespread use of F5 BIG-IP products in sectors such as finance, telecommunications, healthcare, and government, the potential for operational disruption is significant. Attackers could leverage this vulnerability to cause targeted outages or as part of a broader attack campaign to degrade network defenses.
Mitigation Recommendations
1. Immediately review and restrict HTTP/2 Ingress configurations on affected BIG-IP Next SPK devices, disabling HTTP/2 Ingress if not strictly required. 2. Implement network-level filtering to block or limit traffic patterns that could trigger the NULL pointer dereference, using anomaly detection or rate limiting on ingress points. 3. Monitor TMM process stability and system logs closely for signs of unexpected termination or crashes. 4. Coordinate with F5 Networks for timely updates and patches; apply official patches as soon as they become available. 5. Employ redundant BIG-IP devices and failover configurations to minimize service disruption in case of TMM failure. 6. Consider deploying Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) to detect and block malformed or suspicious HTTP/2 traffic. 7. Conduct regular vulnerability assessments and penetration testing focused on HTTP/2 traffic handling to identify potential exploitation attempts. 8. Maintain an incident response plan that includes procedures for rapid recovery from BIG-IP service interruptions.
Affected Countries
United States, United Kingdom, Germany, France, Japan, South Korea, Australia, Canada, Netherlands, Singapore, India
CVE-2025-58120: CWE-476 NULL Pointer Dereference in F5 BIG-IP Next SPK
Description
When HTTP/2 Ingress is configured, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-58120 is a vulnerability identified in F5 BIG-IP Next SPK, specifically affecting versions 1.7.0, 1.8.0, 1.9.0, and 2.0.0. The flaw is a NULL pointer dereference (CWE-476) that occurs when HTTP/2 Ingress is enabled and certain undisclosed traffic is received by the Traffic Management Microkernel (TMM). The TMM is a core component responsible for managing network traffic and load balancing within the BIG-IP platform. When the vulnerability is triggered, the TMM process terminates unexpectedly, causing a denial of service (DoS) by disrupting traffic management functions. The vulnerability can be exploited remotely without any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The CVSS 3.1 base score of 7.5 reflects the high impact on availability (A:H) with no impact on confidentiality or integrity, and the attack vector is network-based with low attack complexity. Although no public exploits have been reported yet, the critical role of BIG-IP devices in enterprise and service provider networks makes this vulnerability a significant concern. The lack of available patches at the time of publication necessitates immediate risk mitigation and monitoring by affected organizations.
Potential Impact
The primary impact of CVE-2025-58120 is a denial of service condition caused by the termination of the TMM process on affected F5 BIG-IP Next SPK devices. This disruption can lead to network traffic management failures, resulting in service outages for applications and services relying on BIG-IP for load balancing, security, and traffic routing. Organizations using these devices in critical infrastructure, cloud environments, or enterprise networks may experience degraded network performance or complete loss of service availability. The vulnerability does not directly compromise data confidentiality or integrity but can indirectly affect business operations and service continuity. Given the widespread use of F5 BIG-IP products in sectors such as finance, telecommunications, healthcare, and government, the potential for operational disruption is significant. Attackers could leverage this vulnerability to cause targeted outages or as part of a broader attack campaign to degrade network defenses.
Mitigation Recommendations
1. Immediately review and restrict HTTP/2 Ingress configurations on affected BIG-IP Next SPK devices, disabling HTTP/2 Ingress if not strictly required. 2. Implement network-level filtering to block or limit traffic patterns that could trigger the NULL pointer dereference, using anomaly detection or rate limiting on ingress points. 3. Monitor TMM process stability and system logs closely for signs of unexpected termination or crashes. 4. Coordinate with F5 Networks for timely updates and patches; apply official patches as soon as they become available. 5. Employ redundant BIG-IP devices and failover configurations to minimize service disruption in case of TMM failure. 6. Consider deploying Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) to detect and block malformed or suspicious HTTP/2 traffic. 7. Conduct regular vulnerability assessments and penetration testing focused on HTTP/2 traffic handling to identify potential exploitation attempts. 8. Maintain an incident response plan that includes procedures for rapid recovery from BIG-IP service interruptions.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:38.040Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99427d7577a180040a4
Added to database: 10/15/2025, 2:03:00 PM
Last enriched: 2/27/2026, 5:39:45 AM
Last updated: 3/25/2026, 5:51:28 AM
Views: 113
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.