CVE Alert: CVE-2025-59478 – F5 – BIG-IP

CVE-2025-59478

HIGHNo exploitation known

When a BIG-IP AFM denial-of-service (DoS) protection profile is configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
F5
Product
BIG-IP
Versions
17.5.0 lt 17.5.1 | 17.1.0 lt 17.1.3 | 16.1.0 lt * | 15.1.0 lt 15.1.10.8
CWE
CWE-824, CWE-824 Access of Uninitialized Pointer
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-15T13:55:43.732Z
Updated
2025-10-16T03:56:56.625Z

AI Summary Analysis

Risk verdict

High risk to service availability from a remote, unauthenticated DoS trigger; patch promptly where AFM DoS profiles are deployed.

Why this matters

Exploitation can crash the Traffic Management Microkernel, bringing down protected virtual servers and disrupting critical applications. Attackers aiming to degrade customer experience or force outages can achieve impact with no user interaction or credentials.

Most likely attack path

Network-based exploitation with no privileges required and no user interaction. An attacker can send crafted requests to a virtual server protected by the AFM DoS profile, triggering TMM termination. With Scope unchanged, disruption may cascade to multiple protected services or instances sharing the same host.

Who is most exposed

organisations with public-facing BIG-IP deployments that rely on AFM DoS profiles on virtual servers, including enterprise perimeters, data centres, and service providers in cloud or hybrid environments.

Detection ideas

  • Monitor for TMM crashes and restart cycles; correlate with traffic spikes.
  • Look for crash dumps or kernel/driver errors linked to AFM components.
  • Anomalous surge in connections to protected virtual servers without corresponding authentication.
  • AFM DoS policy hits exceeding baseline; unusual rule matches.
  • Sudden, unexplained outages affecting web-facing services.

Mitigation and prioritisation

  • Apply the vendor patch to supported release lines as a priority; verify compatibility in test environment before production rollout.
  • If patching is delayed, temporarily disable or adjust the DoS protection profile on affected virtual servers and enable compensating controls.
  • Implement rate-limiting, robust monitoring, and rapid failover to HA pairs; review change-control documentation and schedule a maintenance window.
  • Validate EoTS status of the targeted versions and plan upgrade accordingly.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features