Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59478: CWE-824 Access of Uninitialized Pointer in F5 BIG-IP

0
High
VulnerabilityCVE-2025-59478cvecve-2025-59478cwe-824
Published: Wed Oct 15 2025 (10/15/2025, 13:55:43 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-59478 is a high-severity vulnerability in F5 BIG-IP devices affecting versions 15. 1. 0, 17. 1. 0, and 17. 5. 0. It arises from an access of an uninitialized pointer (CWE-824) in the Traffic Management Microkernel (TMM) when a BIG-IP AFM denial-of-service protection profile is configured on a virtual server. Exploiting this vulnerability allows an unauthenticated attacker to send crafted requests that cause the TMM process to crash, resulting in a denial-of-service condition. No confidentiality or integrity impact is reported, but availability is severely affected.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:09:40 UTC

Technical Analysis

CVE-2025-59478 is a vulnerability identified in F5 BIG-IP versions 15.1.0, 17.1.0, and 17.5.0, specifically affecting the Traffic Management Microkernel (TMM) component when a BIG-IP AFM (Advanced Firewall Manager) denial-of-service protection profile is enabled on a virtual server. The root cause is an access of an uninitialized pointer (CWE-824), which can be triggered by specially crafted, undisclosed network requests. This leads to the TMM process terminating unexpectedly, causing a denial-of-service (DoS) condition that disrupts traffic management and potentially impacts all services relying on the BIG-IP device. The vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the ease of exploitation and significant impact on availability, while confidentiality and integrity remain unaffected. The vulnerability does not affect versions that have reached End of Technical Support (EoTS). No public exploits or patches are currently available, but the vulnerability is officially published and should be addressed promptly. The BIG-IP platform is widely used in enterprise and service provider environments for load balancing, application delivery, and security, making this vulnerability critical for network stability and service continuity.

Potential Impact

For European organizations, the impact of CVE-2025-59478 can be substantial, particularly for those relying on F5 BIG-IP devices for critical network infrastructure, application delivery, and security enforcement. A successful exploitation results in the termination of the TMM process, effectively causing a denial-of-service that can disrupt access to hosted applications and services. This can lead to operational downtime, loss of productivity, and potential financial losses, especially in sectors like finance, telecommunications, government, and critical infrastructure. The lack of confidentiality or integrity impact limits data breach risks, but availability disruption can affect service level agreements and damage organizational reputation. Given the remote, unauthenticated nature of the exploit, attackers can launch DoS attacks from external networks, increasing the threat surface. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation. Organizations with stringent uptime requirements and those operating in regulated environments must prioritize mitigation to maintain compliance and operational resilience.

Mitigation Recommendations

1. Monitor network traffic to BIG-IP virtual servers with AFM DoS protection profiles enabled, looking for unusual or malformed requests that could trigger the vulnerability. 2. Restrict access to BIG-IP management interfaces and virtual servers to trusted IP addresses using network segmentation and firewall rules. 3. Temporarily disable or modify AFM DoS protection profiles on virtual servers if feasible, to reduce exposure until a patch is available. 4. Stay in close contact with F5 Networks for official patches or updates addressing CVE-2025-59478 and apply them promptly once released. 5. Implement redundancy and failover mechanisms for BIG-IP devices to minimize service disruption in case of TMM process crashes. 6. Conduct regular backups of BIG-IP configurations and maintain incident response plans tailored to network device DoS scenarios. 7. Employ intrusion detection/prevention systems (IDS/IPS) to detect and block exploit attempts targeting this vulnerability. 8. Review and update network security policies to include monitoring for emerging threats related to BIG-IP vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:03.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a180040c0

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/23/2025, 1:09:40 AM

Last updated: 11/28/2025, 6:38:31 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats