Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58424: CWE-340: Generation of Predictable Numbers or Identifiers in F5 BIG-IP

0
Low
VulnerabilityCVE-2025-58424cvecve-2025-58424cwe-340
Published: Wed Oct 15 2025 (10/15/2025, 13:55:47 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-58424 is a vulnerability in F5 BIG-IP versions 15. 1. 0, 16. 1. 0, and 17. 1. 0 involving the generation of predictable numbers or identifiers (CWE-340). This flaw can lead to data corruption and unauthorized data modification in protocols lacking message integrity protection when subjected to undisclosed traffic. The vulnerability has a CVSS score of 3. 7, indicating low severity, with no known exploits in the wild.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:08:25 UTC

Technical Analysis

CVE-2025-58424 is a vulnerability identified in F5 Networks' BIG-IP product, specifically affecting versions 15.1.0, 16.1.0, and 17.1.0. The issue stems from the generation of predictable numbers or identifiers, classified under CWE-340, which can be exploited by sending certain undisclosed traffic to the BIG-IP system. This leads to data corruption and unauthorized modification of data within protocols that do not implement message integrity protection. The vulnerability does not affect confidentiality or availability but impacts data integrity. The CVSS v3.1 base score is 3.7 (low), with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). The vulnerability is not known to be exploited in the wild, and no patches or exploit code have been publicly disclosed as of the publication date (October 15, 2025). The vulnerability affects protocols lacking message integrity protection, which means that the risk is higher in environments where such protocols are in use. The vulnerability is not evaluated for versions that have reached End of Technical Support (EoTS).

Potential Impact

For European organizations, the primary impact of CVE-2025-58424 is the potential for unauthorized data modification and data corruption within network traffic handled by vulnerable BIG-IP devices. This can undermine the integrity of data flows, potentially affecting critical applications relying on BIG-IP for load balancing, traffic management, or security functions. While confidentiality and availability are not directly impacted, integrity breaches can lead to incorrect processing of data, misrouting, or manipulation of network sessions, which may cascade into operational disruptions or compliance violations. Organizations using protocols without message integrity protection are particularly at risk. The low CVSS score and high attack complexity reduce the likelihood of widespread exploitation; however, targeted attacks against high-value infrastructure or sensitive data flows remain a concern. Given the widespread use of F5 BIG-IP in European enterprises, telecoms, and government networks, the vulnerability could affect critical sectors if not addressed.

Mitigation Recommendations

1. Upgrade affected BIG-IP systems to versions beyond 17.1.0, 16.1.0, or 15.1.0 once patches or updates are released by F5 Networks. 2. Implement network segmentation to isolate BIG-IP devices from untrusted networks and limit exposure to potentially malicious traffic. 3. Employ protocols with built-in message integrity protection (e.g., TLS, IPsec) to reduce the risk of data corruption or unauthorized modification. 4. Monitor network traffic for anomalies or unexpected modifications that could indicate exploitation attempts. 5. Restrict management and administrative access to BIG-IP devices using strong authentication and access controls. 6. Regularly audit and review BIG-IP configurations to ensure adherence to security best practices and minimize attack surface. 7. Engage with F5 support and subscribe to security advisories to receive timely information on patches and mitigations. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious traffic patterns targeting BIG-IP devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:21.100Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a180040b4

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/23/2025, 1:08:25 AM

Last updated: 12/4/2025, 4:21:29 AM

Views: 320

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats