CVE Alert: CVE-2025-59778 – F5 – F5OS – Chassis

CVE-2025-59778

HIGHNo exploitation known

When the Allowed IP Addresses feature is configured on the F5OS-C partition control plane, undisclosed traffic can cause multiple containers to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
F5
Product
F5OS – Chassis
Versions
1.8.0 lt 1.8.2 | 1.6.0 lt 1.6.4
CWE
CWE-770, CWE-770 Allocation of Resources Without Limits or Throttling
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-15T13:55:49.239Z
Updated
2025-10-16T03:56:38.832Z

AI Summary Analysis

Risk verdict

High risk of remote denial-of-service to F5OS-C containers via the Allowed IP Addresses feature; exploitation state is not confirmed in active campaigns.

Why this matters

A successful trigger can cause container terminations and impact availability of critical network and load‑balancing functions, potentially harming SLAs and uptime. The CVSS indicates network access without authentication with a high impact on availability, so outages could disrupt traffic management across data centres or edge deployments.

Most likely attack path

No user interaction is required; an attacker with network access to the control plane could exploit misconfigured or broad Allowed IP Addresses. The precondition is a configured Allowed IP Addresses setting on the F5OS-C partition control plane, with no privileges required, enabling remote DoS and potential disruption of container orchestration.

Who is most exposed

F5OS-C deployments in data centres or cloud-edge environments with management-plane exposure and permissive IP allow-lists are most at risk, especially where access controls or segmentation to the partition control plane are weak.

Detection ideas

  • Sudden spikes in container terminations or restarts on affected partitions
  • Logs showing control-plane container crashes or termination events
  • Unusual or excessive traffic to the partition control plane from external networks
  • Alerts when Allowed IP Addresses configuration changes or expands

Mitigation and prioritisation

  • Apply vendor patch to fixed versions (≥1.8.2 and ≥1.6.4 as applicable)
  • If patching immediately isn’t feasible, tighten or disable the Allowed IP Addresses feature and restrict management access
  • Audit and harden network segmentation around the F5OS-C control plane
  • Validate changes in a staging environment before rollout
  • Ensure backups and high-availability redundancy are intact
  • Note: KEV/EPSS data are not provided; treat as high-priority within the current patch cycle.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features