CVE-2025-58120: CWE-476 NULL Pointer Dereference in F5 BIG-IP Next SPK
When HTTP/2 Ingress is configured, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-58120 is a vulnerability identified in F5 BIG-IP Next SPK versions 1.7.0 through 2.0.0 that arises from a NULL pointer dereference (CWE-476) within the Traffic Management Microkernel (TMM) component. This flaw is specifically triggered when HTTP/2 Ingress is configured on the device. An attacker can send crafted HTTP/2 traffic that causes the TMM to dereference a NULL pointer, leading to a crash of the TMM process. The TMM is a critical component responsible for managing traffic and load balancing; its termination results in a denial of service (DoS) condition, disrupting network traffic management and potentially causing service outages. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5, reflecting high severity due to its network attack vector, low attack complexity, no required privileges, and no user interaction. The impact is limited to availability, with no direct confidentiality or integrity compromise. No public exploits or active exploitation have been reported yet. The vulnerability affects supported versions only; versions past their End of Technical Support (EoTS) are not evaluated. No patches are currently linked, indicating that remediation may be pending or in development. Organizations using F5 BIG-IP Next SPK with HTTP/2 Ingress enabled should consider this vulnerability a significant risk to service continuity.
Potential Impact
For European organizations, the primary impact of CVE-2025-58120 is the potential for denial of service due to the TMM process crashing on affected F5 BIG-IP Next SPK devices. This can disrupt critical network traffic management functions such as load balancing, application delivery, and security enforcement. Industries relying heavily on F5 BIG-IP for high availability and secure traffic management—such as financial services, telecommunications, government, and critical infrastructure—may experience outages or degraded service quality. The disruption could affect customer-facing services, internal applications, and inter-organizational communications. Since the vulnerability is remotely exploitable without authentication, attackers could cause widespread service interruptions, potentially impacting business continuity and regulatory compliance. The lack of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the operational risks associated with availability loss. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation means attackers could develop exploits rapidly once details become public.
Mitigation Recommendations
1. Monitor F5 Networks’ official advisories for patches addressing CVE-2025-58120 and apply them promptly once available. 2. If immediate patching is not possible, disable HTTP/2 Ingress on affected BIG-IP Next SPK devices to prevent exploitation. 3. Implement network-level protections such as rate limiting and traffic filtering to detect and block anomalous HTTP/2 traffic patterns that could trigger the vulnerability. 4. Employ robust monitoring of TMM process health and automated alerting to detect crashes or service disruptions quickly. 5. Use redundant BIG-IP devices and failover configurations to minimize service impact during potential DoS events. 6. Conduct internal vulnerability assessments and penetration tests focusing on HTTP/2 traffic handling to identify exposure. 7. Restrict administrative access and network exposure of BIG-IP management interfaces to reduce attack surface. 8. Maintain up-to-date asset inventories to identify all devices running affected versions and ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-58120: CWE-476 NULL Pointer Dereference in F5 BIG-IP Next SPK
Description
When HTTP/2 Ingress is configured, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-58120 is a vulnerability identified in F5 BIG-IP Next SPK versions 1.7.0 through 2.0.0 that arises from a NULL pointer dereference (CWE-476) within the Traffic Management Microkernel (TMM) component. This flaw is specifically triggered when HTTP/2 Ingress is configured on the device. An attacker can send crafted HTTP/2 traffic that causes the TMM to dereference a NULL pointer, leading to a crash of the TMM process. The TMM is a critical component responsible for managing traffic and load balancing; its termination results in a denial of service (DoS) condition, disrupting network traffic management and potentially causing service outages. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5, reflecting high severity due to its network attack vector, low attack complexity, no required privileges, and no user interaction. The impact is limited to availability, with no direct confidentiality or integrity compromise. No public exploits or active exploitation have been reported yet. The vulnerability affects supported versions only; versions past their End of Technical Support (EoTS) are not evaluated. No patches are currently linked, indicating that remediation may be pending or in development. Organizations using F5 BIG-IP Next SPK with HTTP/2 Ingress enabled should consider this vulnerability a significant risk to service continuity.
Potential Impact
For European organizations, the primary impact of CVE-2025-58120 is the potential for denial of service due to the TMM process crashing on affected F5 BIG-IP Next SPK devices. This can disrupt critical network traffic management functions such as load balancing, application delivery, and security enforcement. Industries relying heavily on F5 BIG-IP for high availability and secure traffic management—such as financial services, telecommunications, government, and critical infrastructure—may experience outages or degraded service quality. The disruption could affect customer-facing services, internal applications, and inter-organizational communications. Since the vulnerability is remotely exploitable without authentication, attackers could cause widespread service interruptions, potentially impacting business continuity and regulatory compliance. The lack of confidentiality or integrity impact reduces risks related to data breaches but does not diminish the operational risks associated with availability loss. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation means attackers could develop exploits rapidly once details become public.
Mitigation Recommendations
1. Monitor F5 Networks’ official advisories for patches addressing CVE-2025-58120 and apply them promptly once available. 2. If immediate patching is not possible, disable HTTP/2 Ingress on affected BIG-IP Next SPK devices to prevent exploitation. 3. Implement network-level protections such as rate limiting and traffic filtering to detect and block anomalous HTTP/2 traffic patterns that could trigger the vulnerability. 4. Employ robust monitoring of TMM process health and automated alerting to detect crashes or service disruptions quickly. 5. Use redundant BIG-IP devices and failover configurations to minimize service impact during potential DoS events. 6. Conduct internal vulnerability assessments and penetration tests focusing on HTTP/2 traffic handling to identify exposure. 7. Restrict administrative access and network exposure of BIG-IP management interfaces to reduce attack surface. 8. Maintain up-to-date asset inventories to identify all devices running affected versions and ensure comprehensive coverage of mitigation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:38.040Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99427d7577a180040a4
Added to database: 10/15/2025, 2:03:00 PM
Last enriched: 10/23/2025, 12:54:57 AM
Last updated: 12/2/2025, 5:33:10 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13606: CWE-352 Cross-Site Request Forgery (CSRF) in smackcoders Export All Posts, Products, Orders, Refunds & Users
MediumCVE-2025-13387: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in stellarwp Kadence WooCommerce Email Designer
HighCVE-2025-20792: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T
UnknownCVE-2025-20791: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
UnknownCVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.