CVE-2025-61951: CWE-125 Out-of-bounds Read in F5 BIG-IP
Undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. This issue may occur when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile that is configured with a certificate, key, and the SSL Sign Hash set to ANY, and the backend server is enabled with DTLS 1.2 and client authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-61951 is a vulnerability identified in the F5 BIG-IP Traffic Management Microkernel (TMM) that results from an out-of-bounds read condition (CWE-125). This flaw is triggered when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile configured with a certificate, key, and SSL Sign Hash set to ANY, combined with a backend server also enabled with DTLS 1.2 and client authentication. Under these conditions, specially crafted or undisclosed traffic can cause the TMM process to terminate unexpectedly, leading to denial of service. The vulnerability affects BIG-IP versions 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported versions. The CVSS v3.1 score is 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability arises from improper bounds checking during DTLS traffic processing, which can be exploited remotely without authentication. This could disrupt critical network services managed by BIG-IP devices, especially those leveraging DTLS for secure communications. The issue does not affect versions that have reached End of Technical Support (EoTS).
Potential Impact
For European organizations, the primary impact of CVE-2025-61951 is the potential for denial of service due to TMM termination on F5 BIG-IP devices. This can disrupt load balancing, SSL offloading, and secure traffic management functions, potentially causing outages in critical applications and services. Organizations in sectors such as finance, telecommunications, healthcare, and government that rely heavily on BIG-IP for secure and reliable network traffic management are particularly vulnerable. The disruption could lead to operational downtime, service unavailability, and associated financial and reputational damage. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, availability impacts alone can have severe consequences in high-demand environments. The lack of required authentication and user interaction increases the risk of remote exploitation by attackers scanning for vulnerable BIG-IP instances. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score warrants urgent attention.
Mitigation Recommendations
1. Immediately review and audit the configuration of DTLS 1.2 virtual servers and Server SSL profiles on all BIG-IP devices, focusing on the SSL Sign Hash setting. Avoid using the 'ANY' option for SSL Sign Hash if possible. 2. Temporarily disable DTLS 1.2 virtual servers or client authentication on backend servers if feasible until a patch is available. 3. Implement strict network segmentation and firewall rules to restrict access to BIG-IP management and DTLS service ports only to trusted sources. 4. Monitor network traffic for unusual or malformed DTLS packets that could trigger the vulnerability, using IDS/IPS systems with updated signatures. 5. Engage with F5 support for guidance and to obtain patches or workarounds as soon as they are released. 6. Plan for rapid deployment of patches once available, including testing in staging environments to ensure stability. 7. Maintain up-to-date asset inventories to quickly identify affected BIG-IP versions and prioritize remediation. 8. Consider deploying redundancy and failover mechanisms to minimize service disruption in case of TMM crashes. 9. Educate network and security teams about this vulnerability to ensure timely detection and response.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-61951: CWE-125 Out-of-bounds Read in F5 BIG-IP
Description
Undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. This issue may occur when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile that is configured with a certificate, key, and the SSL Sign Hash set to ANY, and the backend server is enabled with DTLS 1.2 and client authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-61951 is a vulnerability identified in the F5 BIG-IP Traffic Management Microkernel (TMM) that results from an out-of-bounds read condition (CWE-125). This flaw is triggered when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile configured with a certificate, key, and SSL Sign Hash set to ANY, combined with a backend server also enabled with DTLS 1.2 and client authentication. Under these conditions, specially crafted or undisclosed traffic can cause the TMM process to terminate unexpectedly, leading to denial of service. The vulnerability affects BIG-IP versions 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported versions. The CVSS v3.1 score is 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability arises from improper bounds checking during DTLS traffic processing, which can be exploited remotely without authentication. This could disrupt critical network services managed by BIG-IP devices, especially those leveraging DTLS for secure communications. The issue does not affect versions that have reached End of Technical Support (EoTS).
Potential Impact
For European organizations, the primary impact of CVE-2025-61951 is the potential for denial of service due to TMM termination on F5 BIG-IP devices. This can disrupt load balancing, SSL offloading, and secure traffic management functions, potentially causing outages in critical applications and services. Organizations in sectors such as finance, telecommunications, healthcare, and government that rely heavily on BIG-IP for secure and reliable network traffic management are particularly vulnerable. The disruption could lead to operational downtime, service unavailability, and associated financial and reputational damage. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, availability impacts alone can have severe consequences in high-demand environments. The lack of required authentication and user interaction increases the risk of remote exploitation by attackers scanning for vulnerable BIG-IP instances. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score warrants urgent attention.
Mitigation Recommendations
1. Immediately review and audit the configuration of DTLS 1.2 virtual servers and Server SSL profiles on all BIG-IP devices, focusing on the SSL Sign Hash setting. Avoid using the 'ANY' option for SSL Sign Hash if possible. 2. Temporarily disable DTLS 1.2 virtual servers or client authentication on backend servers if feasible until a patch is available. 3. Implement strict network segmentation and firewall rules to restrict access to BIG-IP management and DTLS service ports only to trusted sources. 4. Monitor network traffic for unusual or malformed DTLS packets that could trigger the vulnerability, using IDS/IPS systems with updated signatures. 5. Engage with F5 support for guidance and to obtain patches or workarounds as soon as they are released. 6. Plan for rapid deployment of patches once available, including testing in staging environments to ensure stability. 7. Maintain up-to-date asset inventories to quickly identify affected BIG-IP versions and prioritize remediation. 8. Consider deploying redundancy and failover mechanisms to minimize service disruption in case of TMM crashes. 9. Educate network and security teams about this vulnerability to ensure timely detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:37.994Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99527d7577a180040e7
Added to database: 10/15/2025, 2:03:01 PM
Last enriched: 10/15/2025, 2:05:29 PM
Last updated: 10/16/2025, 11:14:53 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54859: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-54760: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.