CVE Alert: CVE-2025-61938 – F5 – BIG-IP

CVE-2025-61938

HIGHNo exploitation known

When a BIG-IP Advanced WAF or ASM security policy is configured with a URL greater than 1024 characters in length for the Data Guard Protection Enforcement setting, either manually or through the automatic Policy Builder, the bd process can terminate repeatedly.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
F5
Product
BIG-IP
Versions
17.5.0 lt 17.5.1 | 17.1.0 lt 17.1.3 | 16.1.0 lt * | 15.1.0 lt *
CWE
CWE-1284, CWE-1284: Improper Validation of Specified Quantity in Input
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-15T13:55:47.664Z
Updated
2025-10-16T03:56:55.081Z

AI Summary Analysis

Risk verdict

High risk to organisations using BIG-IP Advanced WAF/ASM with Data Guard Protection Enforcement enabled; exploitation activity is not confirmed in this feed, but the potential for rapid availability impact warrants prompt attention.

Why this matters

A crafted URL exceeding 1024 characters can crash the bd process, risking WAF/ASM availability and policy enforcement. In practice, this can disrupt protection for web apps and create a window for denial of service or degraded security posture during policy building.

Most likely attack path

Network-based with no privileges required and no user interaction. An external actor sends requests with ultra-long URLs to a BIG-IP ASM/Advanced WAF policy; if Data Guard Protection Enforcement is in use, the bd process can terminate repeatedly, causing service instability and potential collateral impact on policy handling.

Who is most exposed

Deployments where BIG-IP appliances are Internet-facing or placed in DMZs/cloud front ends, especially those relying on automated Policy Builder or Data Guard features to enforce long URL rules.

Detection ideas

  • bd process crash/restart events in system logs
  • Repeated restarts following policy-building operations
  • Logs or alerts for Data Guard Protection Enforcement triggers
  • Unusual spikes in WAF/ASM downtime or degraded availability
  • Core dumps or crash artifacts in standard fault directories

Mitigation and prioritisation

  • Apply vendor patch/update to supported non-affected versions; verify release notes for fixes addressing long-URL handling.
  • If patching is delayed, disable or constrain Data Guard Protection Enforcement for overly long URLs and enforce server-side URL length validation at the edge.
  • Implement proactive monitoring for bd process stability and policy-builder activity; ensure rapid rollback plans.
  • Schedule change-control and test in staging before production rollout; verify EoTS status and supportability.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features