CVE-2025-61990: CWE-415 Double Free in F5 BIG-IP
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-61990 is a double free vulnerability categorized under CWE-415 found in F5 BIG-IP devices, specifically impacting multi-bladed platforms with more than one blade. The flaw arises when the Traffic Management Microkernel (TMM), a core component responsible for traffic processing and management, encounters certain undisclosed traffic patterns that trigger a double free condition. This memory management error causes the TMM process to terminate unexpectedly, leading to a denial of service (DoS) condition. The vulnerability affects multiple versions of BIG-IP software, including 15.1.0, 16.1.0, 17.1.0, and 17.5.0, but does not apply to versions that have reached End of Technical Support (EoTS). Exploitation requires no privileges or user interaction and can be performed remotely over the network, increasing the risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and impact on availability. While no known exploits have been reported in the wild, the potential for disruption in critical network environments is significant. The vulnerability does not compromise confidentiality or integrity but can severely impact service continuity, especially in environments relying on BIG-IP for load balancing, application delivery, and security functions. No patches were listed at the time of publication, so monitoring vendor advisories for updates is essential.
Potential Impact
The primary impact of CVE-2025-61990 is a denial of service condition caused by the termination of the Traffic Management Microkernel (TMM) on affected F5 BIG-IP devices. This can lead to network outages, interruption of application delivery, and degraded performance of critical services dependent on BIG-IP infrastructure. Organizations using multi-bladed BIG-IP platforms in data centers, cloud environments, or edge networks may experience significant operational disruptions. The vulnerability does not expose sensitive data or allow unauthorized access, but the loss of availability can affect business continuity, customer experience, and security posture. In sectors such as finance, healthcare, telecommunications, and government, where BIG-IP devices are widely deployed for load balancing and security, the impact could be severe. The ease of remote exploitation without authentication increases the risk of automated attacks or exploitation by malicious actors aiming to disrupt services. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a critical concern until patched.
Mitigation Recommendations
Organizations should prioritize monitoring for vendor updates and apply patches as soon as they become available from F5 Networks. In the absence of patches, network administrators should consider implementing network-level protections such as filtering or rate-limiting traffic patterns that may trigger the vulnerability, although the exact triggering traffic is undisclosed. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting anomalous traffic to BIG-IP devices may help mitigate exploitation attempts. Segmentation of management and data plane networks can reduce exposure. Regularly auditing and updating BIG-IP configurations to minimize attack surface and disabling unused services or blades can also help. Maintaining up-to-date backups and incident response plans for BIG-IP infrastructure will aid in rapid recovery if exploitation occurs. Close collaboration with F5 support and threat intelligence sharing communities is recommended to stay informed about emerging exploits and mitigation strategies.
Affected Countries
United States, United Kingdom, Germany, France, Japan, Australia, Canada, Netherlands, South Korea, Singapore, India
CVE-2025-61990: CWE-415 Double Free in F5 BIG-IP
Description
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-61990 is a double free vulnerability categorized under CWE-415 found in F5 BIG-IP devices, specifically impacting multi-bladed platforms with more than one blade. The flaw arises when the Traffic Management Microkernel (TMM), a core component responsible for traffic processing and management, encounters certain undisclosed traffic patterns that trigger a double free condition. This memory management error causes the TMM process to terminate unexpectedly, leading to a denial of service (DoS) condition. The vulnerability affects multiple versions of BIG-IP software, including 15.1.0, 16.1.0, 17.1.0, and 17.5.0, but does not apply to versions that have reached End of Technical Support (EoTS). Exploitation requires no privileges or user interaction and can be performed remotely over the network, increasing the risk profile. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and impact on availability. While no known exploits have been reported in the wild, the potential for disruption in critical network environments is significant. The vulnerability does not compromise confidentiality or integrity but can severely impact service continuity, especially in environments relying on BIG-IP for load balancing, application delivery, and security functions. No patches were listed at the time of publication, so monitoring vendor advisories for updates is essential.
Potential Impact
The primary impact of CVE-2025-61990 is a denial of service condition caused by the termination of the Traffic Management Microkernel (TMM) on affected F5 BIG-IP devices. This can lead to network outages, interruption of application delivery, and degraded performance of critical services dependent on BIG-IP infrastructure. Organizations using multi-bladed BIG-IP platforms in data centers, cloud environments, or edge networks may experience significant operational disruptions. The vulnerability does not expose sensitive data or allow unauthorized access, but the loss of availability can affect business continuity, customer experience, and security posture. In sectors such as finance, healthcare, telecommunications, and government, where BIG-IP devices are widely deployed for load balancing and security, the impact could be severe. The ease of remote exploitation without authentication increases the risk of automated attacks or exploitation by malicious actors aiming to disrupt services. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a critical concern until patched.
Mitigation Recommendations
Organizations should prioritize monitoring for vendor updates and apply patches as soon as they become available from F5 Networks. In the absence of patches, network administrators should consider implementing network-level protections such as filtering or rate-limiting traffic patterns that may trigger the vulnerability, although the exact triggering traffic is undisclosed. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting anomalous traffic to BIG-IP devices may help mitigate exploitation attempts. Segmentation of management and data plane networks can reduce exposure. Regularly auditing and updating BIG-IP configurations to minimize attack surface and disabling unused services or blades can also help. Maintaining up-to-date backups and incident response plans for BIG-IP infrastructure will aid in rapid recovery if exploitation occurs. Close collaboration with F5 support and threat intelligence sharing communities is recommended to stay informed about emerging exploits and mitigation strategies.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-06T23:17:24.141Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efbf6451297e5c13a00152
Added to database: 10/15/2025, 3:36:04 PM
Last enriched: 2/27/2026, 6:06:54 AM
Last updated: 3/25/2026, 2:55:45 PM
Views: 207
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.