Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59778: CWE-770 Allocation of Resources Without Limits or Throttling in F5 F5OS - Chassis

0
High
VulnerabilityCVE-2025-59778cvecve-2025-59778cwe-770
Published: Wed Oct 15 2025 (10/15/2025, 13:55:49 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: F5OS - Chassis

Description

When the Allowed IP Addresses feature is configured on the F5OS-C partition control plane, undisclosed traffic can cause multiple containers to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:07:03 UTC

Technical Analysis

CVE-2025-59778 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the F5OS - Chassis product, specifically versions 1.6.0 and 1.8.0. The flaw lies in the handling of the Allowed IP Addresses feature on the F5OS-C partition control plane. When this feature is configured, an attacker can send specially crafted or undisclosed traffic that causes excessive resource allocation within the system. This uncontrolled resource consumption leads to the termination of multiple containers running on the chassis, effectively causing a denial-of-service (DoS) condition. The vulnerability can be exploited remotely without requiring any authentication or user interaction, increasing its risk profile. The impact is limited to availability, with no direct confidentiality or integrity compromise reported. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. No public exploits have been reported yet, and software versions beyond End of Technical Support were not evaluated. The lack of patch links suggests that fixes may be pending or forthcoming from the vendor. This vulnerability highlights the importance of resource management and throttling in network device control planes to prevent service outages caused by malformed or unexpected traffic patterns.

Potential Impact

For European organizations, the primary impact of CVE-2025-59778 is the potential for denial-of-service attacks against critical network infrastructure using F5OS - Chassis devices. These devices often serve as core components in data centers, service provider networks, and enterprise environments, managing traffic and providing essential network functions. Disruption of containerized services on the chassis control plane could lead to partial or complete loss of network functionality, affecting business continuity, customer access, and internal operations. Sectors such as finance, telecommunications, government, and critical infrastructure operators are particularly vulnerable due to their reliance on high availability and robust network performance. The vulnerability's ease of exploitation without authentication means attackers can launch attacks from anywhere on the internet, increasing the threat surface. Additionally, the lack of current public exploits does not preclude future weaponization, necessitating proactive mitigation. The impact on availability could also cascade into regulatory and compliance issues under European data protection and operational resilience frameworks.

Mitigation Recommendations

1. Monitor network traffic to and from F5OS - Chassis devices for unusual patterns or spikes that could indicate exploitation attempts targeting the Allowed IP Addresses feature. 2. Implement strict ingress filtering and rate limiting on network segments connected to the F5OS-C partition control plane to reduce the risk of resource exhaustion attacks. 3. Disable or carefully configure the Allowed IP Addresses feature if it is not essential to operations, minimizing the attack surface. 4. Engage with F5 Networks for official patches or firmware updates addressing this vulnerability and plan timely deployment once available. 5. Conduct thorough testing of updated firmware in controlled environments before production rollout to avoid service disruptions. 6. Establish incident response procedures specifically for network device DoS scenarios, including fallback and redundancy plans. 7. Use network segmentation to isolate critical F5OS devices from less trusted networks, limiting exposure. 8. Maintain up-to-date asset inventories to quickly identify affected devices and versions within the organization. 9. Collaborate with managed security service providers or threat intelligence sources to stay informed about emerging exploits or attack campaigns targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:21.143Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a180040c9

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/15/2025, 2:07:03 PM

Last updated: 10/16/2025, 1:36:06 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats