Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59778: CWE-770 Allocation of Resources Without Limits or Throttling in F5 F5OS - Chassis

0
High
VulnerabilityCVE-2025-59778cvecve-2025-59778cwe-770
Published: Wed Oct 15 2025 (10/15/2025, 13:55:49 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: F5OS - Chassis

Description

CVE-2025-59778 is a high-severity vulnerability affecting F5OS - Chassis versions 1. 6. 0 and 1. 8. 0. It arises from improper resource allocation controls in the Allowed IP Addresses feature on the F5OS-C partition control plane. An attacker can send undisclosed traffic that causes multiple containers to terminate, leading to denial of service. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. While no known exploits are currently in the wild, the impact on availability is significant. European organizations using affected F5OS versions in critical network infrastructure could face service disruptions.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:10:18 UTC

Technical Analysis

CVE-2025-59778 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the F5OS - Chassis product, specifically versions 1.6.0 and 1.8.0. The flaw exists in the Allowed IP Addresses feature configured on the F5OS-C partition control plane. When this feature is enabled, an attacker can send specially crafted or undisclosed traffic that triggers excessive resource consumption, causing multiple containers within the system to terminate unexpectedly. This results in a denial-of-service (DoS) condition impacting the availability of the affected system. The vulnerability can be exploited remotely without requiring any authentication or user interaction, increasing the risk profile. The CVSS v3.1 base score is 7.5, indicating a high severity primarily due to the impact on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges required (PR:N). Although no public exploits have been reported yet, the vulnerability poses a significant risk to network infrastructure relying on F5OS - Chassis, especially in environments where the Allowed IP Addresses feature is actively used. The vulnerability has been published recently, and no patches have been linked yet, but organizations should anticipate vendor updates. The flaw highlights the importance of resource management and throttling in network device control planes to prevent service disruption.

Potential Impact

For European organizations, the primary impact of CVE-2025-59778 is the potential for denial-of-service attacks against critical network infrastructure components running F5OS - Chassis. This can lead to service outages affecting data center operations, cloud services, and enterprise network availability. Organizations relying on F5 devices for load balancing, security, or traffic management could experience degraded performance or complete loss of service in affected containers. This disruption can impact business continuity, customer access, and internal communications. Given the vulnerability requires no authentication, attackers from outside the network perimeter could exploit it remotely, increasing the threat surface. Critical sectors such as finance, telecommunications, government, and healthcare in Europe that depend on F5 infrastructure are particularly vulnerable. The lack of confidentiality or integrity impact means data breaches are unlikely, but availability loss can have cascading effects on dependent services and SLAs. The absence of known exploits provides a window for proactive mitigation, but the high severity score demands urgent attention.

Mitigation Recommendations

1. Restrict network access to the F5OS-C partition control plane interfaces by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2. Monitor network traffic patterns for unusual or unexpected flows targeting the Allowed IP Addresses feature, using IDS/IPS and SIEM tools to detect potential exploitation attempts. 3. Disable the Allowed IP Addresses feature if it is not essential to operations, reducing the attack surface. 4. Engage with F5 Networks for timely updates and patches addressing this vulnerability; apply them promptly once available. 5. Implement rate limiting and resource usage monitoring on the control plane to detect and prevent resource exhaustion conditions. 6. Conduct regular security assessments and penetration testing focusing on control plane components to identify similar resource allocation issues. 7. Maintain up-to-date asset inventories to identify all F5OS - Chassis devices and their firmware versions to prioritize remediation efforts. 8. Develop and test incident response plans specific to denial-of-service scenarios affecting network infrastructure devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:21.143Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a180040c9

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 10/23/2025, 1:10:18 AM

Last updated: 11/28/2025, 2:08:08 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats