Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61974: CWE-401: Missing Release of Memory after Effective Lifetime in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61974cvecve-2025-61974cwe-401
Published: Wed Oct 15 2025 (10/15/2025, 13:55:55 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

CVE-2025-61974 is a high-severity memory leak vulnerability in F5 BIG-IP devices when a client SSL profile is configured on a virtual server. Undisclosed requests can cause increased memory consumption, potentially leading to denial of service due to resource exhaustion. The vulnerability affects multiple recent BIG-IP versions (15. 1. 0, 16. 1. 0, 17. 1. 0, and 17. 5.

AI-Powered Analysis

AILast updated: 10/23/2025, 01:13:58 UTC

Technical Analysis

CVE-2025-61974 is a vulnerability classified under CWE-401 (Missing Release of Memory after Effective Lifetime) affecting F5 BIG-IP devices. The flaw occurs when a client SSL profile is configured on a virtual server, allowing certain crafted or undisclosed requests to cause a memory leak by not properly releasing allocated memory after use. This leads to increased memory resource utilization over time, which can degrade system performance and eventually cause denial of service due to exhaustion of memory resources. The vulnerability affects multiple actively supported BIG-IP versions (15.1.0, 16.1.0, 17.1.0, and 17.5.0). The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct confidentiality or integrity compromise. No public exploits are known at this time, but the vulnerability's characteristics make it a candidate for exploitation in the future. The lack of a patch at publication time means organizations must rely on mitigations until vendor updates are released. The vulnerability is particularly critical for environments where BIG-IP devices handle large volumes of SSL traffic, as memory exhaustion can disrupt critical network services.

Potential Impact

For European organizations, the impact of CVE-2025-61974 is primarily on the availability of network services managed by F5 BIG-IP devices. These devices are widely used in enterprise, financial, telecommunications, and government sectors for SSL offloading, load balancing, and application delivery. Memory leaks can lead to degraded performance, system instability, and ultimately denial of service, disrupting business operations and potentially causing financial and reputational damage. Critical infrastructure relying on BIG-IP for secure communications may face outages, impacting service continuity. Since exploitation requires no authentication or user interaction and can be triggered remotely, attackers could launch denial-of-service attacks from anywhere, increasing the threat surface. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency for European organizations to address this vulnerability promptly.

Mitigation Recommendations

1. Monitor memory usage on BIG-IP devices closely, especially those with client SSL profiles configured on virtual servers, to detect abnormal increases indicative of exploitation attempts. 2. Limit exposure by restricting network access to management and virtual server interfaces where possible, using network segmentation and firewall rules. 3. Apply vendor patches or updates as soon as they become available; maintain contact with F5 support for timely notifications. 4. Temporarily disable or reconfigure client SSL profiles on virtual servers if feasible to reduce risk until patches are applied. 5. Implement rate limiting or traffic filtering to mitigate potential exploitation by limiting the volume of requests that could trigger the memory leak. 6. Conduct regular vulnerability assessments and penetration testing focused on BIG-IP devices to identify and remediate similar issues proactively. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential denial-of-service incidents caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-06T23:17:24.111Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efa99527d7577a180040f3

Added to database: 10/15/2025, 2:03:01 PM

Last enriched: 10/23/2025, 1:13:58 AM

Last updated: 12/4/2025, 2:56:34 PM

Views: 331

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats