CVE Alert: CVE-2025-58071 – F5 – BIG-IP

CVE-2025-58071

HIGHNo exploitation known

When IPsec is configured on the BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
F5, F5, F5
Product
BIG-IP, BIG-IP Next CNF, BIG-IP Next for Kubernetes
Versions
17.5.0 lt 17.5.1 | 17.1.0 lt 17.1.3 | 16.1.0 lt 16.1.6.1 | 15.1.0 lt 15.1.10.8 | 2.0.0 lt * | 1.1.0 lt * | 2.0.0 lt *
CWE
CWE-457, CWE-457: Use of Uninitialized Variable
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-15T15:19:46.470Z
Updated
2025-10-16T03:57:04.045Z

AI Summary Analysis

Risk verdict

High risk: remote network traffic can terminate the Traffic Management Microkernel (TMM) when IPsec is configured, with no user interaction required.

Why this matters

A TMM crash or restart can disrupt VPN/IPsec tunnels and other services relying on BIG-IP, causing selective or widespread downtime. Attackers could leverage this to degrade availability in perimeter or data‑centre edge deployments, impacting remote access, site connectivity, and service continuity.

Most likely attack path

Exploitation is network-based with no privileges or user interaction needed, provided IPsec is enabled. An attacker would craft traffic or abuse undisclosed IPsec traffic to trigger TMM termination, exploiting preconditions around IPsec-enabled BIG-IP systems and exposed TMM processes.

Who is most exposed

Organizations deploying BIG-IP with IPsec in production—common in gateway, VPN edge, and security-forward architectures—including BIG-IP Next CNF and Kubernetes deployments, are at higher risk. Systems on legacy branches with IPsec also fall within affected scope.

Detection ideas

  • TMM crashes or restarts logged in system/application logs
  • Unusual spikes or resets in IPsec tunnel activity
  • Core dumps or high CPU on TMM processes around network events
  • Repeated IPsec-related termination messages in logs
  • Anomalous traffic patterns targeting TMM interfaces

Mitigation and prioritisation

  • Apply fixed releases/patches from F5; move to a supported, non-EoTS version where available
  • If IPsec is not required, disable or minimise IPsec exposure; restrict IPsec endpoints and traffic
  • Enforce network access controls: limit connections to trusted sources; deploy segmentation
  • Monitor TMM stability and IPsec tunnel health; implement alerting for TMM terminations
  • Change-management: test patch in a staging environment before production rollout; schedule maintenance windows
  • If KEV indicates exploitation or EPSS is ≥0.5, treat as priority 1 (data not provided in this report)

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features