Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59478: CWE-824 Access of Uninitialized Pointer in F5 BIG-IP

0
High
VulnerabilityCVE-2025-59478cvecve-2025-59478cwe-824
Published: Wed Oct 15 2025 (10/15/2025, 13:55:43 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP AFM denial-of-service (DoS) protection profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:07:53 UTC

Technical Analysis

CVE-2025-59478 is a vulnerability identified in F5 Networks' BIG-IP product, specifically affecting versions 15.1.0, 17.1.0, and 17.5.0. The issue stems from an access of an uninitialized pointer (CWE-824) within the Traffic Management Microkernel (TMM) process when a BIG-IP AFM (Advanced Firewall Manager) denial-of-service protection profile is configured on a virtual server. This flaw allows specially crafted, undisclosed network requests to cause the TMM process to crash, leading to denial-of-service (DoS) conditions. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making it remotely exploitable. The TMM is a core component responsible for traffic management and load balancing, so its termination disrupts the availability of services managed by BIG-IP devices. Although no public exploits have been reported yet, the vulnerability’s CVSS score of 7.5 reflects a high impact on availability with low attack complexity and no privileges required. The flaw does not affect confidentiality or integrity but poses a significant risk to service continuity. The vulnerability was published on October 15, 2025, and affects supported versions only, excluding those that have reached End of Technical Support. No patches were listed at the time of reporting, emphasizing the need for vigilance and prompt application of vendor updates once released.

Potential Impact

For European organizations, the impact of CVE-2025-59478 can be substantial, especially for those relying on F5 BIG-IP devices for critical network infrastructure, application delivery, and security enforcement. The forced termination of the TMM process results in denial-of-service, potentially disrupting access to web applications, VPNs, and other services managed by BIG-IP. This can lead to operational downtime, loss of productivity, and potential financial losses. Sectors such as finance, telecommunications, healthcare, and government, which often deploy BIG-IP for traffic management and security, are particularly vulnerable. Additionally, the disruption could affect compliance with regulatory requirements for service availability and incident response. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if threat actors develop exploit tools. The absence of known exploits currently provides a window for proactive mitigation, but the threat landscape could evolve rapidly.

Mitigation Recommendations

1. Monitor F5 Networks’ official security advisories closely and apply patches or hotfixes immediately upon release to address CVE-2025-59478. 2. Until patches are available, consider disabling or reconfiguring the AFM denial-of-service protection profile on virtual servers if feasible, to reduce exposure. 3. Implement network-level protections such as firewall rules and intrusion prevention systems to restrict access to BIG-IP management and traffic interfaces, limiting exposure to untrusted networks. 4. Employ traffic anomaly detection to identify and block suspicious or malformed requests that could trigger the vulnerability. 5. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. 6. Conduct regular security assessments and penetration testing focused on BIG-IP configurations to identify and remediate weaknesses. 7. Segment critical network infrastructure to minimize the blast radius of any potential DoS attacks targeting BIG-IP devices. 8. Educate network and security teams about this vulnerability to ensure rapid detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:03.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a180040c0

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/15/2025, 2:07:53 PM

Last updated: 10/16/2025, 12:19:12 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats