Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59781: CWE-459 Incomplete Cleanup in F5 BIG-IP

0
High
VulnerabilityCVE-2025-59781cvecve-2025-59781cwe-459
Published: Wed Oct 15 2025 (10/15/2025, 13:55:46 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When DNS cache is configured on a BIG-IP or BIG-IP Next CNF virtual server, undisclosed DNS queries can cause an increase in memory resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:47:31 UTC

Technical Analysis

CVE-2025-59781 is a vulnerability classified under CWE-459 (Incomplete Cleanup) affecting F5 BIG-IP and BIG-IP Next CNF virtual servers when DNS cache is enabled. The issue arises because undisclosed DNS queries cause the system to retain DNS cache entries improperly, leading to increased memory resource utilization over time. This incomplete cleanup of cached DNS data can result in memory exhaustion, degrading system performance or causing denial of service conditions. The vulnerability affects multiple recent versions of BIG-IP (15.1.0, 16.1.0, and 17.1.0) and does not require authentication or user interaction, making it remotely exploitable by an attacker who can send crafted DNS queries to the affected virtual server. Although no public exploits have been reported yet, the potential for resource exhaustion poses a significant risk to availability of network services relying on BIG-IP devices. The vulnerability does not impact confidentiality or integrity directly but can disrupt service availability. The CVSS 3.1 score of 7.5 reflects a network attack vector with low complexity and no privileges or user interaction required, emphasizing the threat's seriousness. No patches are currently linked, and versions that have reached End of Technical Support are not evaluated, so organizations should verify their version support status. The vulnerability highlights the importance of proper resource management and cleanup in DNS caching implementations within critical network infrastructure devices.

Potential Impact

The primary impact of CVE-2025-59781 is on the availability of F5 BIG-IP devices configured with DNS caching. By exploiting incomplete cleanup of DNS cache entries, an attacker can cause memory resource exhaustion, potentially leading to system slowdowns, crashes, or denial of service. This can disrupt critical network functions such as load balancing, application delivery, and security services that rely on BIG-IP devices. Organizations worldwide that depend on BIG-IP for managing traffic and securing applications may experience outages or degraded performance, affecting business continuity and user experience. The vulnerability does not compromise data confidentiality or integrity but can indirectly impact operational stability. Given the widespread deployment of F5 BIG-IP in enterprise, government, and service provider networks, the threat could have broad implications, especially in environments with high DNS query volumes or where DNS caching is heavily utilized. The ease of remote exploitation without authentication increases the risk of automated attacks targeting vulnerable devices.

Mitigation Recommendations

Organizations should immediately assess whether their F5 BIG-IP deployments are running affected versions (15.1.0, 16.1.0, or 17.1.0) with DNS cache enabled on virtual servers. If so, they should prioritize upgrading to a fixed version once available from F5 or apply any interim mitigations recommended by the vendor. In the absence of patches, administrators can consider disabling DNS caching on virtual servers if operationally feasible to prevent memory buildup. Monitoring memory utilization and DNS cache size on BIG-IP devices can help detect abnormal resource consumption early. Network-level controls such as rate limiting or filtering of DNS queries to BIG-IP virtual servers may reduce exposure to exploit attempts. Regularly reviewing device configurations and applying security best practices for BIG-IP management will also reduce risk. Finally, maintaining up-to-date inventory and patch management processes for critical infrastructure devices is essential to respond promptly to such vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:21.072Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99427d7577a180040cc

Added to database: 10/15/2025, 2:03:00 PM

Last enriched: 2/27/2026, 5:47:31 AM

Last updated: 3/25/2026, 1:41:18 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses