Cyber Posture

CVE-2025-24497

High

Published: 05 February 2025

Published
05 February 2025
Modified
06 August 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0048 65.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-24497 is a denial-of-service vulnerability affecting the F5 BIG-IP Traffic Management Microkernel (TMM). When URL categorization is configured on a virtual server, certain undisclosed requests can cause TMM to terminate. The issue is linked to CWE-125 (Out-of-bounds Read) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting high availability impact with no confidentiality or integrity effects. Software versions that have reached End of Technical Support (EoTS) were not evaluated.

A remote, unauthenticated attacker can exploit this vulnerability by sending the undisclosed requests to an affected virtual server with URL categorization enabled. Successful exploitation leads to TMM termination, resulting in a denial of service that disrupts traffic processing on the BIG-IP system until TMM restarts.

The F5 security advisory at https://my.f5.com/manage/s/article/K000140920 provides details on mitigation, including available patches and configuration guidance.

Details

CWE(s)
CWE-125

Affected Products

f5
big-ip policy enforcement manager
17.1.0 — 17.1.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability in public-facing F5 BIG-IP virtual server with URL categorization allows remote unauthenticated DoS via crafted requests, directly enabling T1190 (Exploit Public-Facing Application).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References