Cyber Posture

CVE-2025-24497

High

Published: 05 February 2025

Published
05 February 2025
Modified
06 August 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0048 65.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24497 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in F5 Big-Ip Policy Enforcement Manager. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 34.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the out-of-bounds read flaw in TMM by applying vendor patches for affected BIG-IP versions.

prevent

Protects against denial-of-service by limiting effects of malformed requests causing TMM termination.

prevent

Validates incoming requests to URL categorization-enabled virtual servers, rejecting malformed inputs that trigger the out-of-bounds read.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability in public-facing F5 BIG-IP virtual server with URL categorization allows remote unauthenticated DoS via crafted requests, directly enabling T1190 (Exploit Public-Facing Application).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

When URL categorization is configured on a virtual server, undisclosed requests can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Deeper analysisAI

CVE-2025-24497 is a denial-of-service vulnerability affecting the F5 BIG-IP Traffic Management Microkernel (TMM). When URL categorization is configured on a virtual server, certain undisclosed requests can cause TMM to terminate. The issue is linked to CWE-125 (Out-of-bounds Read) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting high availability impact with no confidentiality or integrity effects. Software versions that have reached End of Technical Support (EoTS) were not evaluated.

A remote, unauthenticated attacker can exploit this vulnerability by sending the undisclosed requests to an affected virtual server with URL categorization enabled. Successful exploitation leads to TMM termination, resulting in a denial of service that disrupts traffic processing on the BIG-IP system until TMM restarts.

The F5 security advisory at https://my.f5.com/manage/s/article/K000140920 provides details on mitigation, including available patches and configuration guidance.

Details

CWE(s)

Affected Products

f5
big-ip policy enforcement manager
17.1.0 — 17.1.2

CVEs Like This One

CVE-2025-22891Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-53521Same product class: WAF / load balancer
CVE-2025-23239Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-20058Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-21091Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-20045Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-24320Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-24312Same product class: WAF / load balancer
CVE-2025-20029Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-22846Same product: F5 Big-Ip Policy Enforcement Manager

References