Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61951: CWE-125 Out-of-bounds Read in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61951cvecve-2025-61951cwe-125
Published: Wed Oct 15 2025 (10/15/2025, 13:55:50 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

Undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  This issue may occur when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile that is configured with a certificate, key, and the SSL Sign Hash set to ANY, and the backend server is enabled with DTLS 1.2 and client authentication.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 14:05:29 UTC

Technical Analysis

CVE-2025-61951 is a vulnerability identified in the F5 BIG-IP Traffic Management Microkernel (TMM) that results from an out-of-bounds read condition (CWE-125). This flaw is triggered when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile configured with a certificate, key, and SSL Sign Hash set to ANY, combined with a backend server also enabled with DTLS 1.2 and client authentication. Under these conditions, specially crafted or undisclosed traffic can cause the TMM process to terminate unexpectedly, leading to denial of service. The vulnerability affects BIG-IP versions 16.1.0, 17.1.0, and 17.5.0, all of which are currently supported versions. The CVSS v3.1 score is 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability arises from improper bounds checking during DTLS traffic processing, which can be exploited remotely without authentication. This could disrupt critical network services managed by BIG-IP devices, especially those leveraging DTLS for secure communications. The issue does not affect versions that have reached End of Technical Support (EoTS).

Potential Impact

For European organizations, the primary impact of CVE-2025-61951 is the potential for denial of service due to TMM termination on F5 BIG-IP devices. This can disrupt load balancing, SSL offloading, and secure traffic management functions, potentially causing outages in critical applications and services. Organizations in sectors such as finance, telecommunications, healthcare, and government that rely heavily on BIG-IP for secure and reliable network traffic management are particularly vulnerable. The disruption could lead to operational downtime, service unavailability, and associated financial and reputational damage. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, availability impacts alone can have severe consequences in high-demand environments. The lack of required authentication and user interaction increases the risk of remote exploitation by attackers scanning for vulnerable BIG-IP instances. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score warrants urgent attention.

Mitigation Recommendations

1. Immediately review and audit the configuration of DTLS 1.2 virtual servers and Server SSL profiles on all BIG-IP devices, focusing on the SSL Sign Hash setting. Avoid using the 'ANY' option for SSL Sign Hash if possible. 2. Temporarily disable DTLS 1.2 virtual servers or client authentication on backend servers if feasible until a patch is available. 3. Implement strict network segmentation and firewall rules to restrict access to BIG-IP management and DTLS service ports only to trusted sources. 4. Monitor network traffic for unusual or malformed DTLS packets that could trigger the vulnerability, using IDS/IPS systems with updated signatures. 5. Engage with F5 support for guidance and to obtain patches or workarounds as soon as they are released. 6. Plan for rapid deployment of patches once available, including testing in staging environments to ensure stability. 7. Maintain up-to-date asset inventories to quickly identify affected BIG-IP versions and prioritize remediation. 8. Consider deploying redundancy and failover mechanisms to minimize service disruption in case of TMM crashes. 9. Educate network and security teams about this vulnerability to ensure timely detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:37.994Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99527d7577a180040e7

Added to database: 10/15/2025, 2:03:01 PM

Last enriched: 10/15/2025, 2:05:29 PM

Last updated: 10/16/2025, 11:14:53 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats