Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61935: CWE-252: Unchecked Return Value in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61935cvecve-2025-61935cwe-252
Published: Wed Oct 15 2025 (10/15/2025, 15:19:46 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-61935 is a high-severity vulnerability affecting F5 BIG-IP devices running versions 15. 1. 0, 17. 1. 0, and 17. 5. 0, specifically when an Advanced WAF or ASM security policy is configured on a virtual server. The vulnerability arises from an unchecked return value in the bd process, which can be triggered by specially crafted requests causing the process to terminate unexpectedly. This results in a denial of service (DoS) condition, impacting availability without compromising confidentiality or integrity. Exploitation requires no authentication or user interaction and can be performed remotely over the network.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:12:24 UTC

Technical Analysis

CVE-2025-61935 is a vulnerability identified in F5 BIG-IP devices, specifically versions 15.1.0, 17.1.0, and 17.5.0, which are widely used for application delivery and security. The issue stems from an unchecked return value in the bd process when an Advanced Web Application Firewall (WAF) or Application Security Manager (ASM) policy is configured on a virtual server. This unchecked return value can be exploited by sending crafted network requests that cause the bd process to terminate unexpectedly. The termination of this critical process leads to a denial of service (DoS) condition, disrupting the availability of the BIG-IP services. The vulnerability does not affect confidentiality or integrity, as it does not allow data leakage or unauthorized modification. The CVSS 3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. No patches or mitigations have been officially released yet, and no known exploits are currently observed in the wild. The vulnerability highlights a classic CWE-252 issue, where failure to check a function's return value leads to instability. Organizations using BIG-IP with Advanced WAF or ASM policies should be aware of potential service interruptions and monitor their devices closely. Since the vulnerability affects supported versions, it is critical to prepare for patching once available and consider temporary mitigations such as restricting access to management interfaces and applying strict network segmentation.

Potential Impact

The primary impact of CVE-2025-61935 is a denial of service condition caused by the termination of the bd process on affected F5 BIG-IP devices. For European organizations, this can lead to significant service disruptions, especially for enterprises and government agencies relying on BIG-IP for load balancing, application delivery, and security enforcement. Critical sectors such as finance, telecommunications, healthcare, and public administration could experience outages affecting business continuity and service availability. The inability to process legitimate traffic or enforce security policies may also increase exposure to other threats during downtime. Although confidentiality and integrity are not directly compromised, the loss of availability can indirectly affect operational security and trust. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation (no authentication or user interaction required) means attackers could weaponize this vulnerability quickly once details become widespread. European organizations with high dependency on BIG-IP devices should prioritize risk assessment and incident response planning to mitigate potential operational impacts.

Mitigation Recommendations

1. Monitor BIG-IP devices for abnormal bd process crashes or service interruptions, using system logs and monitoring tools to detect early signs of exploitation. 2. Restrict network access to BIG-IP management and virtual server interfaces, employing network segmentation and firewall rules to limit exposure to untrusted networks. 3. Disable or carefully review Advanced WAF or ASM policies on virtual servers if feasible, to reduce the attack surface until patches are available. 4. Engage with F5 support and subscribe to security advisories to receive timely updates and patches addressing this vulnerability. 5. Prepare incident response plans that include rapid patch deployment and fallback procedures to minimize downtime in case of exploitation. 6. Conduct penetration testing and vulnerability assessments focused on BIG-IP configurations to identify and remediate potential weaknesses. 7. Consider deploying redundant BIG-IP devices or failover mechanisms to maintain service availability during potential DoS events. 8. Educate network and security teams about this vulnerability to ensure prompt detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:38.002Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efbf6451297e5c13a0014f

Added to database: 10/15/2025, 3:36:04 PM

Last enriched: 10/23/2025, 1:12:24 AM

Last updated: 12/4/2025, 8:50:32 PM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats