CVE-2025-58474: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP
CVE-2025-58474 is a medium severity vulnerability in F5 BIG-IP version 17. 1. 0 involving allocation of resources without limits or throttling (CWE-770). It affects configurations where BIG-IP Advanced WAF is enabled with Server-Side Request Forgery (SSRF) protection or when an NGINX server uses App Protect Bot Defense. The vulnerability allows undisclosed requests to disrupt new client requests, causing a denial of service condition by exhausting resources. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently in the wild, and no patches have been released yet. European organizations using BIG-IP 17. 1. 0 with these specific configurations may experience service disruptions impacting availability.
AI Analysis
Technical Summary
CVE-2025-58474 is a vulnerability classified under CWE-770, which concerns the allocation of resources without proper limits or throttling, leading to potential denial of service (DoS) conditions. This issue specifically affects F5 BIG-IP version 17.1.0 when configured with Advanced Web Application Firewall (WAF) features that include Server-Side Request Forgery (SSRF) protection or when an NGINX server is configured with App Protect Bot Defense. The vulnerability arises because the system does not adequately limit or throttle resource allocation for certain undisclosed requests, which can be crafted to consume excessive resources. This results in disruption of new client requests, effectively denying service to legitimate users. The CVSS v3.1 score is 5.3 (medium), reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity loss. No known exploits have been reported in the wild, and no patches are currently available, though the vendor has published the vulnerability details. The vulnerability does not affect versions that have reached End of Technical Support (EoTS).
Potential Impact
For European organizations, the primary impact of CVE-2025-58474 is a denial of service condition that disrupts availability of services protected by F5 BIG-IP Advanced WAF or NGINX App Protect Bot Defense. This can affect web-facing applications, potentially causing downtime or degraded performance. Critical sectors such as finance, healthcare, telecommunications, and government services that rely on BIG-IP for security and traffic management are at risk of service interruptions. The lack of confidentiality or integrity impact reduces the risk of data breaches but availability disruptions can lead to operational losses, reputational damage, and regulatory compliance issues under GDPR if services become unavailable. Since exploitation requires no authentication and can be performed remotely, attackers can launch DoS attacks from anywhere, increasing the threat surface. Organizations using version 17.1.0 with the specified configurations should consider this a significant availability risk until mitigations or patches are applied.
Mitigation Recommendations
1. Monitor resource utilization closely on BIG-IP devices, especially when Advanced WAF with SSRF protection or NGINX App Protect Bot Defense is enabled, to detect abnormal spikes indicative of exploitation attempts. 2. Implement network-level rate limiting and filtering to restrict potentially malicious traffic patterns targeting the vulnerable configurations. 3. Restrict administrative and management interface access to trusted networks and use strong authentication and network segmentation to reduce attack vectors. 4. Deploy Web Application Firewall rules to detect and block suspicious request patterns that could trigger resource exhaustion. 5. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. 6. Engage with F5 support and monitor their advisories for patches or updates addressing this vulnerability and apply them promptly once available. 7. Consider temporary disabling or reconfiguring SSRF protection or App Protect Bot Defense features if feasible and if the risk of exploitation outweighs the benefits until a patch is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-58474: CWE-770 Allocation of Resources Without Limits or Throttling in F5 BIG-IP
Description
CVE-2025-58474 is a medium severity vulnerability in F5 BIG-IP version 17. 1. 0 involving allocation of resources without limits or throttling (CWE-770). It affects configurations where BIG-IP Advanced WAF is enabled with Server-Side Request Forgery (SSRF) protection or when an NGINX server uses App Protect Bot Defense. The vulnerability allows undisclosed requests to disrupt new client requests, causing a denial of service condition by exhausting resources. Exploitation requires no authentication or user interaction and can be performed remotely over the network. No known exploits are currently in the wild, and no patches have been released yet. European organizations using BIG-IP 17. 1. 0 with these specific configurations may experience service disruptions impacting availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-58474 is a vulnerability classified under CWE-770, which concerns the allocation of resources without proper limits or throttling, leading to potential denial of service (DoS) conditions. This issue specifically affects F5 BIG-IP version 17.1.0 when configured with Advanced Web Application Firewall (WAF) features that include Server-Side Request Forgery (SSRF) protection or when an NGINX server is configured with App Protect Bot Defense. The vulnerability arises because the system does not adequately limit or throttle resource allocation for certain undisclosed requests, which can be crafted to consume excessive resources. This results in disruption of new client requests, effectively denying service to legitimate users. The CVSS v3.1 score is 5.3 (medium), reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity loss. No known exploits have been reported in the wild, and no patches are currently available, though the vendor has published the vulnerability details. The vulnerability does not affect versions that have reached End of Technical Support (EoTS).
Potential Impact
For European organizations, the primary impact of CVE-2025-58474 is a denial of service condition that disrupts availability of services protected by F5 BIG-IP Advanced WAF or NGINX App Protect Bot Defense. This can affect web-facing applications, potentially causing downtime or degraded performance. Critical sectors such as finance, healthcare, telecommunications, and government services that rely on BIG-IP for security and traffic management are at risk of service interruptions. The lack of confidentiality or integrity impact reduces the risk of data breaches but availability disruptions can lead to operational losses, reputational damage, and regulatory compliance issues under GDPR if services become unavailable. Since exploitation requires no authentication and can be performed remotely, attackers can launch DoS attacks from anywhere, increasing the threat surface. Organizations using version 17.1.0 with the specified configurations should consider this a significant availability risk until mitigations or patches are applied.
Mitigation Recommendations
1. Monitor resource utilization closely on BIG-IP devices, especially when Advanced WAF with SSRF protection or NGINX App Protect Bot Defense is enabled, to detect abnormal spikes indicative of exploitation attempts. 2. Implement network-level rate limiting and filtering to restrict potentially malicious traffic patterns targeting the vulnerable configurations. 3. Restrict administrative and management interface access to trusted networks and use strong authentication and network segmentation to reduce attack vectors. 4. Deploy Web Application Firewall rules to detect and block suspicious request patterns that could trigger resource exhaustion. 5. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. 6. Engage with F5 support and monitor their advisories for patches or updates addressing this vulnerability and apply them promptly once available. 7. Consider temporary disabling or reconfiguring SSRF protection or App Protect Bot Defense features if feasible and if the risk of exploitation outweighs the benefits until a patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-06T23:17:24.062Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99427d7577a180040b7
Added to database: 10/15/2025, 2:03:00 PM
Last enriched: 10/23/2025, 1:08:47 AM
Last updated: 12/3/2025, 2:18:15 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13756: CWE-862 Missing Authorization in techjewel Fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
MediumCVE-2025-13401: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optimizingmatters Autoptimize
MediumCVE-2025-13390: CWE-303 Incorrect Implementation of Authentication Algorithm in listingthemes WP Directory Kit
CriticalCVE-2025-13359: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumCVE-2025-13354: CWE-862 Missing Authorization in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.