CVE-2025-21091

7.5 HIGH

📋 TL;DR

This vulnerability in F5 BIG-IP systems allows attackers to cause memory exhaustion through undisclosed SNMP requests when SNMP v1/v2c is disabled. This affects BIG-IP systems with vulnerable software versions, potentially leading to denial of service. Organizations running affected BIG-IP versions are at risk.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Affected versions: 17.1.0, 16.1.0-16.1.4, 15.1.0-15.1.10, 14.1.0-14.1.5.6, 13.1.0-13.1.5.3
Operating Systems: F5 TMOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when SNMP v1 or v2c is disabled. Systems with SNMP v1/v2c enabled are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system outage due to memory exhaustion, causing service disruption and potential cascading failures in dependent systems.

🟠

Likely Case

Degraded performance and intermittent service disruptions as memory resources are consumed, requiring system restarts.

🟢

If Mitigated

Minimal impact with proper network controls and monitoring in place to detect and block malicious requests.

🌐 Internet-Facing: HIGH - BIG-IP systems are often internet-facing load balancers, making them prime targets for DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to disrupt critical infrastructure services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending specific undisclosed requests to the system. No authentication is required to trigger the memory consumption.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in: 17.1.0.3, 16.1.4.1, 15.1.10.2, 14.1.5.7, 13.1.5.4

Vendor Advisory: https://my.f5.com/manage/s/article/K000140933

Restart Required: No

Instructions:

1. Download appropriate patch from F5 Downloads. 2. Upload to BIG-IP system. 3. Install using tmsh: 'install sys software image <filename>'. 4. Verify installation.

🔧 Temporary Workarounds

Enable SNMP v1/v2c

all

Enable SNMP v1 or v2c on the system to prevent exploitation of this vulnerability

tmsh modify sys snmp communities add { community-name <name> access ro source 0.0.0.0/0 version v1 }
tmsh save sys config

Restrict SNMP Access

all

Limit SNMP access to trusted management networks only

tmsh modify sys snmp communities <community-name> source <trusted-network>

🧯 If You Can't Patch

  • Implement strict network ACLs to limit SNMP traffic to trusted management networks only
  • Enable comprehensive monitoring for abnormal memory usage patterns and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check BIG-IP version with: 'tmsh show sys version' and compare against affected versions. Verify SNMP v1/v2c status with: 'tmsh list sys snmp'

Check Version:

tmsh show sys version | grep -i version

Verify Fix Applied:

Verify installed version is patched: 'tmsh show sys version' should show fixed version. Check for abnormal memory usage patterns.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SNMP request patterns in /var/log/ltm
  • Rapid memory consumption alerts in system logs
  • SNMP-related errors or warnings

Network Indicators:

  • Unusual SNMP traffic patterns to BIG-IP systems
  • Spike in SNMP requests from untrusted sources

SIEM Query:

source="bigip_logs" AND ("SNMP" OR "memory" OR "resource") AND ("error" OR "warning" OR "critical")

🔗 References

📤 Share & Export