CVE-2025-61960: CWE-476 NULL Pointer Dereference in F5 BIG-IP
CVE-2025-61960 is a high-severity vulnerability in F5 BIG-IP devices affecting versions 16. 1. 0, 17. 1. 0, and 17. 5. 0. It involves a NULL pointer dereference (CWE-476) triggered when a per-request policy is configured on a BIG-IP APM portal access virtual server. Exploiting this vulnerability causes the Traffic Management Microkernel (TMM) to terminate, resulting in a denial of service. The vulnerability can be exploited remotely without authentication or user interaction, making it particularly dangerous.
AI Analysis
Technical Summary
CVE-2025-61960 is a vulnerability identified in F5 Networks' BIG-IP product, specifically affecting versions 16.1.0, 17.1.0, and 17.5.0. The flaw is a NULL pointer dereference (CWE-476) that occurs when a per-request policy is configured on a BIG-IP Access Policy Manager (APM) portal access virtual server. Under certain undisclosed traffic conditions, this vulnerability causes the Traffic Management Microkernel (TMM) component to crash or terminate unexpectedly. The TMM is a critical component responsible for processing and managing network traffic on BIG-IP devices. Its termination results in a denial of service (DoS) condition, disrupting the availability of services relying on the BIG-IP device. The vulnerability can be triggered remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no public exploits have been reported yet, the high CVSS score of 7.5 reflects the significant risk posed by this flaw. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. The vendor has not yet released patches or mitigations, and versions that have reached End of Technical Support (EoTS) are excluded from evaluation. Organizations using BIG-IP APM with per-request policies should be aware of this vulnerability and prepare to respond promptly once patches become available.
Potential Impact
For European organizations, the primary impact of CVE-2025-61960 is the potential for denial of service on critical network infrastructure. BIG-IP devices are widely used in Europe for load balancing, secure remote access, and application delivery, especially in sectors such as finance, telecommunications, government, and critical infrastructure. A successful exploitation could cause service outages, disrupting business operations and potentially leading to financial losses and reputational damage. The lack of authentication and user interaction requirements increases the risk of automated or widespread attacks. Additionally, organizations relying on BIG-IP APM for secure portal access may experience interruptions in user authentication and access management, affecting employee productivity and customer access. Although no data breach or integrity compromise is indicated, the availability impact alone can have cascading effects on dependent services and compliance with service-level agreements (SLAs). The absence of known exploits provides a window for proactive mitigation, but the high severity demands urgent attention.
Mitigation Recommendations
1. Immediately review and audit BIG-IP APM configurations, focusing on virtual servers with per-request policies enabled. 2. Restrict network exposure of vulnerable BIG-IP virtual servers by implementing strict firewall rules and network segmentation to limit access to trusted sources only. 3. Monitor BIG-IP device logs and network traffic for unusual patterns or crashes related to TMM termination. 4. Prepare incident response plans to quickly detect and recover from potential denial of service events caused by this vulnerability. 5. Engage with F5 Networks support and subscribe to their security advisories to receive timely patch releases and updates. 6. Consider deploying redundant BIG-IP devices or failover mechanisms to maintain service continuity during potential attacks or crashes. 7. Evaluate alternative access methods or temporary configuration changes that reduce reliance on per-request policies until a patch is available. 8. Conduct internal awareness training for network and security teams about this vulnerability and its impact to ensure rapid response capability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2025-61960: CWE-476 NULL Pointer Dereference in F5 BIG-IP
Description
CVE-2025-61960 is a high-severity vulnerability in F5 BIG-IP devices affecting versions 16. 1. 0, 17. 1. 0, and 17. 5. 0. It involves a NULL pointer dereference (CWE-476) triggered when a per-request policy is configured on a BIG-IP APM portal access virtual server. Exploiting this vulnerability causes the Traffic Management Microkernel (TMM) to terminate, resulting in a denial of service. The vulnerability can be exploited remotely without authentication or user interaction, making it particularly dangerous.
AI-Powered Analysis
Technical Analysis
CVE-2025-61960 is a vulnerability identified in F5 Networks' BIG-IP product, specifically affecting versions 16.1.0, 17.1.0, and 17.5.0. The flaw is a NULL pointer dereference (CWE-476) that occurs when a per-request policy is configured on a BIG-IP Access Policy Manager (APM) portal access virtual server. Under certain undisclosed traffic conditions, this vulnerability causes the Traffic Management Microkernel (TMM) component to crash or terminate unexpectedly. The TMM is a critical component responsible for processing and managing network traffic on BIG-IP devices. Its termination results in a denial of service (DoS) condition, disrupting the availability of services relying on the BIG-IP device. The vulnerability can be triggered remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no public exploits have been reported yet, the high CVSS score of 7.5 reflects the significant risk posed by this flaw. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. The vendor has not yet released patches or mitigations, and versions that have reached End of Technical Support (EoTS) are excluded from evaluation. Organizations using BIG-IP APM with per-request policies should be aware of this vulnerability and prepare to respond promptly once patches become available.
Potential Impact
For European organizations, the primary impact of CVE-2025-61960 is the potential for denial of service on critical network infrastructure. BIG-IP devices are widely used in Europe for load balancing, secure remote access, and application delivery, especially in sectors such as finance, telecommunications, government, and critical infrastructure. A successful exploitation could cause service outages, disrupting business operations and potentially leading to financial losses and reputational damage. The lack of authentication and user interaction requirements increases the risk of automated or widespread attacks. Additionally, organizations relying on BIG-IP APM for secure portal access may experience interruptions in user authentication and access management, affecting employee productivity and customer access. Although no data breach or integrity compromise is indicated, the availability impact alone can have cascading effects on dependent services and compliance with service-level agreements (SLAs). The absence of known exploits provides a window for proactive mitigation, but the high severity demands urgent attention.
Mitigation Recommendations
1. Immediately review and audit BIG-IP APM configurations, focusing on virtual servers with per-request policies enabled. 2. Restrict network exposure of vulnerable BIG-IP virtual servers by implementing strict firewall rules and network segmentation to limit access to trusted sources only. 3. Monitor BIG-IP device logs and network traffic for unusual patterns or crashes related to TMM termination. 4. Prepare incident response plans to quickly detect and recover from potential denial of service events caused by this vulnerability. 5. Engage with F5 Networks support and subscribe to their security advisories to receive timely patch releases and updates. 6. Consider deploying redundant BIG-IP devices or failover mechanisms to maintain service continuity during potential attacks or crashes. 7. Evaluate alternative access methods or temporary configuration changes that reduce reliance on per-request policies until a patch is available. 8. Conduct internal awareness training for network and security teams about this vulnerability and its impact to ensure rapid response capability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:43.592Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efa99527d7577a180040f0
Added to database: 10/15/2025, 2:03:01 PM
Last enriched: 10/23/2025, 1:13:44 AM
Last updated: 12/4/2025, 1:08:33 PM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11222: na in LINE Corporation Central Dogma
MediumCVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.