Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61960: CWE-476 NULL Pointer Dereference in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61960cvecve-2025-61960cwe-476
Published: Wed Oct 15 2025 (10/15/2025, 13:55:54 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-61960 is a high-severity vulnerability in F5 BIG-IP devices affecting versions 16. 1. 0, 17. 1. 0, and 17. 5. 0. It involves a NULL pointer dereference (CWE-476) triggered when a per-request policy is configured on a BIG-IP APM portal access virtual server. Exploiting this vulnerability causes the Traffic Management Microkernel (TMM) to terminate, resulting in a denial of service. The vulnerability can be exploited remotely without authentication or user interaction, making it particularly dangerous.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:13:44 UTC

Technical Analysis

CVE-2025-61960 is a vulnerability identified in F5 Networks' BIG-IP product, specifically affecting versions 16.1.0, 17.1.0, and 17.5.0. The flaw is a NULL pointer dereference (CWE-476) that occurs when a per-request policy is configured on a BIG-IP Access Policy Manager (APM) portal access virtual server. Under certain undisclosed traffic conditions, this vulnerability causes the Traffic Management Microkernel (TMM) component to crash or terminate unexpectedly. The TMM is a critical component responsible for processing and managing network traffic on BIG-IP devices. Its termination results in a denial of service (DoS) condition, disrupting the availability of services relying on the BIG-IP device. The vulnerability can be triggered remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although no public exploits have been reported yet, the high CVSS score of 7.5 reflects the significant risk posed by this flaw. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. The vendor has not yet released patches or mitigations, and versions that have reached End of Technical Support (EoTS) are excluded from evaluation. Organizations using BIG-IP APM with per-request policies should be aware of this vulnerability and prepare to respond promptly once patches become available.

Potential Impact

For European organizations, the primary impact of CVE-2025-61960 is the potential for denial of service on critical network infrastructure. BIG-IP devices are widely used in Europe for load balancing, secure remote access, and application delivery, especially in sectors such as finance, telecommunications, government, and critical infrastructure. A successful exploitation could cause service outages, disrupting business operations and potentially leading to financial losses and reputational damage. The lack of authentication and user interaction requirements increases the risk of automated or widespread attacks. Additionally, organizations relying on BIG-IP APM for secure portal access may experience interruptions in user authentication and access management, affecting employee productivity and customer access. Although no data breach or integrity compromise is indicated, the availability impact alone can have cascading effects on dependent services and compliance with service-level agreements (SLAs). The absence of known exploits provides a window for proactive mitigation, but the high severity demands urgent attention.

Mitigation Recommendations

1. Immediately review and audit BIG-IP APM configurations, focusing on virtual servers with per-request policies enabled. 2. Restrict network exposure of vulnerable BIG-IP virtual servers by implementing strict firewall rules and network segmentation to limit access to trusted sources only. 3. Monitor BIG-IP device logs and network traffic for unusual patterns or crashes related to TMM termination. 4. Prepare incident response plans to quickly detect and recover from potential denial of service events caused by this vulnerability. 5. Engage with F5 Networks support and subscribe to their security advisories to receive timely patch releases and updates. 6. Consider deploying redundant BIG-IP devices or failover mechanisms to maintain service continuity during potential attacks or crashes. 7. Evaluate alternative access methods or temporary configuration changes that reduce reliance on per-request policies until a patch is available. 8. Conduct internal awareness training for network and security teams about this vulnerability and its impact to ensure rapid response capability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:43.592Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99527d7577a180040f0

Added to database: 10/15/2025, 2:03:01 PM

Last enriched: 10/23/2025, 1:13:44 AM

Last updated: 12/4/2025, 1:08:33 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats