CVE Alert: CVE-2025-53856 – F5 – BIG-IP
CVE-2025-53856
When a virtual server, network address translation (NAT) object, or secure network address translation (SNAT) object uses the embedded Packet Velocity Acceleration (ePVA) feature, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. To determine which BIG-IP platforms have an ePVA chip refer to K12837: Overview of the ePVA feature https://my.f5.com/manage/s/article/K12837 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Summary Analysis
Risk verdict
High risk to availability if ePVA-enabled traffic can trigger TMM termination; exploitation status is not shown as active, but disruption potential is significant.
Why this matters
ePVA acceleration is common in BIG-IP NAT/SNAT configurations, so a crash can cause outages or degraded service across front-end traffic. The CVSS metrics emphasise high availability impact with no confidentiality or integrity loss, meaning attackers would primarily aim to disrupt services rather than exfiltrate data.
Most likely attack path
Network-based, no authentication, no user interaction required. Preconditions include BIG-IP platforms with embedded ePVA enabled and traffic flows through affected virtual servers or NAT/SNAT objects. If an attacker can reach the appliance, undisclosed traffic could trigger the TMM crash, potentially causing rapid service disruption or failover events.
Who is most exposed
Organizations running BIG-IP NAT/SNAT or virtual servers with ePVA enabled, especially in data-centre or cloud front-end roles. Be cautious where older, potentially unsupported versions remain in production.
Detection ideas
- TMM crash events and unexpected process restarts
- Sudden traffic dropouts or outages correlated with NAT/SNAT/ePVA traffic
- Crash dumps or core files in TMM logs
- Increased HA failovers or pool reconfigurations
- Anomalous ePVA-related log entries around traffic ramps
Mitigation and prioritisation
- Upgrade to a supported BIG-IP version with the fix; apply vendor advisory K000156707 guidance.
- If possible, minimise use of ePVA paths for NAT/SNAT/virtual servers until patched; consider disabling or routing away from affected features.
- Implement strict change management and test in a staging environment before production deployment.
- Enhance monitoring for TMM stability, automated health checks, and rapid recovery procedures.
- Ensure devices are not EoTS; verify maintenance windows and asset inventory for affected versions.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.