A recently disclosed vulnerability in F5’s BIG-IP systems has raised alarm within the cybersecurity community.
The flaw, designated CVE-2025-21091, enables remote attackers to exploit SNMP configuration issues, potentially leading to Denial-of-Service (DoS) attacks on affected systems.
This vulnerability, which carries a CVSS v4.0 score of 8.7 (High), impacts the control plane of BIG-IP systems.
F5 has issued a security advisory regarding the issue, urging administrators to take immediate action to mitigate the risks.
The vulnerability arises when SNMP v1 or v2c is disabled on a BIG-IP system. Under these circumstances, unspecified requests can cause increased memory usage on the system.
If left unaddressed, these memory resources may become fully consumed, degrading system performance until the snmpd process is manually or automatically restarted. This opens the door for remote, unauthenticated attackers to launch a DoS attack.
The issue affects the control plane of the BIG-IP system, which may, in turn, impact traffic handling on the data plane.
In essence, attackers could disrupt the operation of critical network and application traffic infrastructure.
F5 has classified this vulnerability under CWE-401: Missing Release of Memory after Effective Lifetime, highlighting the underlying memory management flaw.
The affected BIG-IP versions include:
For other F5 products such as F5OS, NGINX, and Distributed Cloud services, this vulnerability does not pose a threat.
Administrators of vulnerable BIG-IP systems are advised to:
modify sys snmp snmpv2c enable
modify sys snmp snmpv1 enable
save /sys config
Detected internally by F5, this vulnerability serves as a reminder of the importance of routine security checks and prompt patching.
Organizations relying on BIG-IP systems should immediately assess their deployments, implement mitigations, and apply the necessary updates to secure their infrastructure.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
In a recent exploration of embedded device hacking, a researcher demonstrated how to extract firmware…
North Korean state-sponsored hackers, known as APT37 or ScarCruft, have been employing sophisticated tactics to…
Ragnar Loader, a sophisticated toolkit associated with the Ragnar Locker ransomware group, has been instrumental…
EncryptHub, a rising cybercriminal entity, has been under scrutiny by multiple threat intelligence teams, including…
A significant vulnerability in the Android operating system, identified as CVE-2024-31317, has been discovered, allowing…
The integration of Rust into the Linux kernel is a significant step forward in enhancing…