Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61990: CWE-415 Double Free in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61990cvecve-2025-61990cwe-415
Published: Wed Oct 15 2025 (10/15/2025, 15:19:52 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:06:54 UTC

Technical Analysis

CVE-2025-61990 is a double free vulnerability categorized under CWE-415 found in F5 BIG-IP devices, specifically impacting multi-bladed platforms with more than one blade. The flaw arises when the Traffic Management Microkernel (TMM), a core component responsible for traffic processing and management, encounters certain undisclosed traffic patterns that trigger a double free condition. This memory management error causes the TMM process to terminate unexpectedly, leading to a denial of service (DoS) condition. The vulnerability affects multiple versions of BIG-IP software, including 15.1.0, 16.1.0, 17.1.0, and 17.5.0, but does not apply to versions that have reached End of Technical Support (EoTS). Exploitation requires no privileges or user interaction and can be performed remotely over the network, increasing the risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and impact on availability. While no known exploits have been reported in the wild, the potential for disruption in critical network environments is significant. The vulnerability does not compromise confidentiality or integrity but can severely impact service continuity, especially in environments relying on BIG-IP for load balancing, application delivery, and security functions. No patches were listed at the time of publication, so monitoring vendor advisories for updates is essential.

Potential Impact

The primary impact of CVE-2025-61990 is a denial of service condition caused by the termination of the Traffic Management Microkernel (TMM) on affected F5 BIG-IP devices. This can lead to network outages, interruption of application delivery, and degraded performance of critical services dependent on BIG-IP infrastructure. Organizations using multi-bladed BIG-IP platforms in data centers, cloud environments, or edge networks may experience significant operational disruptions. The vulnerability does not expose sensitive data or allow unauthorized access, but the loss of availability can affect business continuity, customer experience, and security posture. In sectors such as finance, healthcare, telecommunications, and government, where BIG-IP devices are widely deployed for load balancing and security, the impact could be severe. The ease of remote exploitation without authentication increases the risk of automated attacks or exploitation by malicious actors aiming to disrupt services. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a critical concern until patched.

Mitigation Recommendations

Organizations should prioritize monitoring for vendor updates and apply patches as soon as they become available from F5 Networks. In the absence of patches, network administrators should consider implementing network-level protections such as filtering or rate-limiting traffic patterns that may trigger the vulnerability, although the exact triggering traffic is undisclosed. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting anomalous traffic to BIG-IP devices may help mitigate exploitation attempts. Segmentation of management and data plane networks can reduce exposure. Regularly auditing and updating BIG-IP configurations to minimize attack surface and disabling unused services or blades can also help. Maintaining up-to-date backups and incident response plans for BIG-IP infrastructure will aid in rapid recovery if exploitation occurs. Close collaboration with F5 support and threat intelligence sharing communities is recommended to stay informed about emerging exploits and mitigation strategies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-06T23:17:24.141Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efbf6451297e5c13a00152

Added to database: 10/15/2025, 3:36:04 PM

Last enriched: 2/27/2026, 6:06:54 AM

Last updated: 3/25/2026, 2:55:45 PM

Views: 207

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses