CVE-2025-61990: CWE-415 Double Free in F5 BIG-IP
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-61990 is a vulnerability classified as CWE-415 (Double Free) found in the Traffic Management Microkernel (TMM) component of F5 Networks' BIG-IP product line. The issue specifically affects multi-bladed BIG-IP platforms configured with more than one blade. A double free occurs when the software attempts to free the same memory location twice, which can corrupt the memory management data structures. In this case, certain undisclosed network traffic can trigger this condition, causing the TMM process to terminate unexpectedly. Since TMM is responsible for managing network traffic and load balancing, its termination results in a denial of service (DoS) condition, disrupting network availability. The vulnerability affects multiple major versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0), all of which are currently supported and not end-of-support. The CVSS v3.1 base score is 7.5, indicating a high severity due to network attack vector, low complexity, no privileges or user interaction required, and a direct impact on availability without affecting confidentiality or integrity. No public exploits or patches have been disclosed at the time of publication, but the vulnerability is officially published and should be addressed promptly. The vulnerability's root cause is a memory management flaw in TMM's handling of traffic on multi-bladed systems, which are often deployed in high-throughput environments requiring robust traffic management and security functions.
Potential Impact
For European organizations, the impact of CVE-2025-61990 can be substantial, especially for those relying on F5 BIG-IP devices for critical network functions such as load balancing, application delivery, and security enforcement. The denial of service caused by TMM termination can lead to network outages, degraded application performance, and potential disruption of business operations. This is particularly critical for sectors like finance, telecommunications, healthcare, and government services where network availability is paramount. The vulnerability's remote exploitability without authentication increases the risk of exploitation by external threat actors, including cybercriminals and nation-state actors. Although no known exploits are currently active, the public disclosure may prompt attackers to develop exploits, increasing urgency for mitigation. Organizations operating multi-bladed BIG-IP platforms must consider the risk of service interruptions and potential cascading effects on dependent systems and services. Additionally, regulatory requirements in Europe around service availability and incident reporting may impose further operational and compliance burdens if exploited.
Mitigation Recommendations
To mitigate CVE-2025-61990, European organizations should first verify if their BIG-IP deployments use multi-bladed platforms and run affected versions (15.1.0, 16.1.0, 17.1.0, or 17.5.0). Immediate steps include: 1) Applying vendor-provided patches or updates once available; 2) If patches are not yet released, consider temporarily disabling multi-blade configurations or isolating affected devices from untrusted networks to reduce exposure; 3) Implement network-level protections such as strict ingress filtering and traffic anomaly detection to block or alert on suspicious traffic patterns that might trigger the vulnerability; 4) Monitor BIG-IP system logs and network traffic for unusual TMM terminations or crashes; 5) Engage with F5 support for guidance and early access to fixes or workarounds; 6) Review and update incident response plans to handle potential denial of service scenarios related to this vulnerability; 7) Conduct thorough testing of patches in controlled environments before deployment to avoid operational disruptions; 8) Maintain up-to-date asset inventories and configuration management to quickly identify affected systems. These targeted actions go beyond generic advice by focusing on the specific multi-blade architecture and the nature of the vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-61990: CWE-415 Double Free in F5 BIG-IP
Description
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-61990 is a vulnerability classified as CWE-415 (Double Free) found in the Traffic Management Microkernel (TMM) component of F5 Networks' BIG-IP product line. The issue specifically affects multi-bladed BIG-IP platforms configured with more than one blade. A double free occurs when the software attempts to free the same memory location twice, which can corrupt the memory management data structures. In this case, certain undisclosed network traffic can trigger this condition, causing the TMM process to terminate unexpectedly. Since TMM is responsible for managing network traffic and load balancing, its termination results in a denial of service (DoS) condition, disrupting network availability. The vulnerability affects multiple major versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0), all of which are currently supported and not end-of-support. The CVSS v3.1 base score is 7.5, indicating a high severity due to network attack vector, low complexity, no privileges or user interaction required, and a direct impact on availability without affecting confidentiality or integrity. No public exploits or patches have been disclosed at the time of publication, but the vulnerability is officially published and should be addressed promptly. The vulnerability's root cause is a memory management flaw in TMM's handling of traffic on multi-bladed systems, which are often deployed in high-throughput environments requiring robust traffic management and security functions.
Potential Impact
For European organizations, the impact of CVE-2025-61990 can be substantial, especially for those relying on F5 BIG-IP devices for critical network functions such as load balancing, application delivery, and security enforcement. The denial of service caused by TMM termination can lead to network outages, degraded application performance, and potential disruption of business operations. This is particularly critical for sectors like finance, telecommunications, healthcare, and government services where network availability is paramount. The vulnerability's remote exploitability without authentication increases the risk of exploitation by external threat actors, including cybercriminals and nation-state actors. Although no known exploits are currently active, the public disclosure may prompt attackers to develop exploits, increasing urgency for mitigation. Organizations operating multi-bladed BIG-IP platforms must consider the risk of service interruptions and potential cascading effects on dependent systems and services. Additionally, regulatory requirements in Europe around service availability and incident reporting may impose further operational and compliance burdens if exploited.
Mitigation Recommendations
To mitigate CVE-2025-61990, European organizations should first verify if their BIG-IP deployments use multi-bladed platforms and run affected versions (15.1.0, 16.1.0, 17.1.0, or 17.5.0). Immediate steps include: 1) Applying vendor-provided patches or updates once available; 2) If patches are not yet released, consider temporarily disabling multi-blade configurations or isolating affected devices from untrusted networks to reduce exposure; 3) Implement network-level protections such as strict ingress filtering and traffic anomaly detection to block or alert on suspicious traffic patterns that might trigger the vulnerability; 4) Monitor BIG-IP system logs and network traffic for unusual TMM terminations or crashes; 5) Engage with F5 support for guidance and early access to fixes or workarounds; 6) Review and update incident response plans to handle potential denial of service scenarios related to this vulnerability; 7) Conduct thorough testing of patches in controlled environments before deployment to avoid operational disruptions; 8) Maintain up-to-date asset inventories and configuration management to quickly identify affected systems. These targeted actions go beyond generic advice by focusing on the specific multi-blade architecture and the nature of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-06T23:17:24.141Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efbf6451297e5c13a00152
Added to database: 10/15/2025, 3:36:04 PM
Last enriched: 10/15/2025, 3:37:19 PM
Last updated: 10/15/2025, 6:03:17 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
CriticalCVE-2025-62371: CWE-295: Improper Certificate Validation in opensearch-project data-prepper
HighCVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate
HighCVE-2025-62381: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in ciscoheat sveltekit-superforms
HighCVE-2025-62380: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in eladnava mailgen
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.