Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61938: CWE-1284: Improper Validation of Specified Quantity in Input in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61938cvecve-2025-61938cwe-1284
Published: Wed Oct 15 2025 (10/15/2025, 13:55:47 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When a BIG-IP Advanced WAF or ASM security policy is configured with a URL greater than 1024 characters in length for the Data Guard Protection Enforcement setting, either manually or through the automatic Policy Builder, the bd process can terminate repeatedly.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:04:37 UTC

Technical Analysis

CVE-2025-61938 is a vulnerability identified in F5 BIG-IP versions 17.1.0 and 17.5.0, specifically affecting the Advanced Web Application Firewall (WAF) and Application Security Manager (ASM) modules. The issue arises when a security policy is configured with a URL exceeding 1024 characters in the Data Guard Protection Enforcement setting, either manually or via the automatic Policy Builder. This triggers improper validation of the input length (classified under CWE-1284), causing the 'bd' process—responsible for enforcing security policies—to repeatedly terminate. The repeated crashing of this critical process results in denial-of-service (DoS), disrupting the availability of the BIG-IP device's security functions. The vulnerability is remotely exploitable without requiring any privileges or user interaction, increasing its risk profile. While no public exploits have been reported yet, the vulnerability's nature and the critical role of BIG-IP devices in network security make it a high-priority issue. The vulnerability does not impact confidentiality or integrity but severely affects availability, potentially leading to service outages or degraded security posture. The vendor has not provided patches at the time of this report, and versions that have reached End of Technical Support are excluded from evaluation.

Potential Impact

The primary impact of CVE-2025-61938 is a denial-of-service condition on F5 BIG-IP devices running affected versions, caused by the repeated termination of the 'bd' process. This can lead to unavailability of critical security functions such as web application firewall protections and application security enforcement, exposing organizations to increased risk from other attacks due to disabled or degraded defenses. Enterprises relying on BIG-IP for traffic management and security may experience service disruptions, potentially affecting business continuity and customer trust. The vulnerability does not expose sensitive data or allow unauthorized access but can indirectly increase risk by disabling protective controls. Given the remote, unauthenticated exploitability and the widespread deployment of BIG-IP in large enterprises, service providers, and government networks, the impact can be significant, especially in environments requiring high availability and robust security.

Mitigation Recommendations

To mitigate CVE-2025-61938, organizations should: 1) Immediately review and restrict the length of URLs configured in the Data Guard Protection Enforcement setting to not exceed 1024 characters, avoiding manual or automated policy configurations that could trigger the vulnerability. 2) Monitor the stability of the 'bd' process and set up alerts for unexpected terminations or service disruptions in BIG-IP devices. 3) Apply any vendor-released patches or updates as soon as they become available, even if the current versions are still supported. 4) Implement network-level protections such as rate limiting and input validation to reduce the likelihood of maliciously crafted long URLs reaching the BIG-IP device. 5) Consider deploying redundant BIG-IP devices or failover mechanisms to maintain availability in case of process crashes. 6) Engage with F5 support for guidance and potential workarounds until official patches are released. 7) Regularly audit security policies and configurations to ensure compliance with recommended limits and best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:21.120Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99527d7577a180040e4

Added to database: 10/15/2025, 2:03:01 PM

Last enriched: 2/27/2026, 6:04:37 AM

Last updated: 3/24/2026, 7:47:25 PM

Views: 174

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses