Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61990: CWE-415 Double Free in F5 BIG-IP

0
High
VulnerabilityCVE-2025-61990cvecve-2025-61990cwe-415
Published: Wed Oct 15 2025 (10/15/2025, 15:19:52 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

AILast updated: 10/15/2025, 15:37:19 UTC

Technical Analysis

CVE-2025-61990 is a vulnerability classified as CWE-415 (Double Free) found in the Traffic Management Microkernel (TMM) component of F5 Networks' BIG-IP product line. The issue specifically affects multi-bladed BIG-IP platforms configured with more than one blade. A double free occurs when the software attempts to free the same memory location twice, which can corrupt the memory management data structures. In this case, certain undisclosed network traffic can trigger this condition, causing the TMM process to terminate unexpectedly. Since TMM is responsible for managing network traffic and load balancing, its termination results in a denial of service (DoS) condition, disrupting network availability. The vulnerability affects multiple major versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0), all of which are currently supported and not end-of-support. The CVSS v3.1 base score is 7.5, indicating a high severity due to network attack vector, low complexity, no privileges or user interaction required, and a direct impact on availability without affecting confidentiality or integrity. No public exploits or patches have been disclosed at the time of publication, but the vulnerability is officially published and should be addressed promptly. The vulnerability's root cause is a memory management flaw in TMM's handling of traffic on multi-bladed systems, which are often deployed in high-throughput environments requiring robust traffic management and security functions.

Potential Impact

For European organizations, the impact of CVE-2025-61990 can be substantial, especially for those relying on F5 BIG-IP devices for critical network functions such as load balancing, application delivery, and security enforcement. The denial of service caused by TMM termination can lead to network outages, degraded application performance, and potential disruption of business operations. This is particularly critical for sectors like finance, telecommunications, healthcare, and government services where network availability is paramount. The vulnerability's remote exploitability without authentication increases the risk of exploitation by external threat actors, including cybercriminals and nation-state actors. Although no known exploits are currently active, the public disclosure may prompt attackers to develop exploits, increasing urgency for mitigation. Organizations operating multi-bladed BIG-IP platforms must consider the risk of service interruptions and potential cascading effects on dependent systems and services. Additionally, regulatory requirements in Europe around service availability and incident reporting may impose further operational and compliance burdens if exploited.

Mitigation Recommendations

To mitigate CVE-2025-61990, European organizations should first verify if their BIG-IP deployments use multi-bladed platforms and run affected versions (15.1.0, 16.1.0, 17.1.0, or 17.5.0). Immediate steps include: 1) Applying vendor-provided patches or updates once available; 2) If patches are not yet released, consider temporarily disabling multi-blade configurations or isolating affected devices from untrusted networks to reduce exposure; 3) Implement network-level protections such as strict ingress filtering and traffic anomaly detection to block or alert on suspicious traffic patterns that might trigger the vulnerability; 4) Monitor BIG-IP system logs and network traffic for unusual TMM terminations or crashes; 5) Engage with F5 support for guidance and early access to fixes or workarounds; 6) Review and update incident response plans to handle potential denial of service scenarios related to this vulnerability; 7) Conduct thorough testing of patches in controlled environments before deployment to avoid operational disruptions; 8) Maintain up-to-date asset inventories and configuration management to quickly identify affected systems. These targeted actions go beyond generic advice by focusing on the specific multi-blade architecture and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-06T23:17:24.141Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efbf6451297e5c13a00152

Added to database: 10/15/2025, 3:36:04 PM

Last enriched: 10/15/2025, 3:37:19 PM

Last updated: 10/15/2025, 6:03:17 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats