CVE-2025-22846
📋 TL;DR
This vulnerability in F5 BIG-IP systems causes the Traffic Management Microkernel (TMM) to crash when specific SIP Session and Router ALG profiles are configured on Message Routing virtual servers. This leads to denial of service, affecting organizations using these specific configurations for SIP traffic handling.
💻 Affected Systems
- F5 BIG-IP
📦 What is this software?
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Acceleration Manager by F5
View all CVEs affecting Big Ip Application Acceleration Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Application Security Manager by F5
View all CVEs affecting Big Ip Application Security Manager →
Big Ip Next Service Proxy For Kubernetes by F5
View all CVEs affecting Big Ip Next Service Proxy For Kubernetes →
Big Ip Next Service Proxy For Kubernetes by F5
View all CVEs affecting Big Ip Next Service Proxy For Kubernetes →
Big Ip Next Service Proxy For Kubernetes by F5
View all CVEs affecting Big Ip Next Service Proxy For Kubernetes →
Big Ip Next Service Proxy For Kubernetes by F5
View all CVEs affecting Big Ip Next Service Proxy For Kubernetes →
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption as TMM crashes, causing all traffic through affected virtual servers to stop until TMM restarts automatically or manually.
Likely Case
Intermittent service outages affecting SIP traffic routing when specific malformed packets trigger the condition.
If Mitigated
Minimal impact if vulnerable configurations are not in use or if traffic filtering prevents triggering packets.
🎯 Exploit Status
Requires sending specific SIP traffic to vulnerable configuration; no authentication needed but requires knowledge of vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in 17.1.1.2, 16.1.4.4, 15.1.10.3, 14.1.5.7 and later
Vendor Advisory: https://my.f5.com/manage/s/article/K000139780
Restart Required: No
Instructions:
1. Download appropriate hotfix from F5 Downloads. 2. Upload to BIG-IP system. 3. Install using tmsh: 'install sys software hotfix <filename>'. 4. Verify installation with 'show sys software'.
🔧 Temporary Workarounds
Remove vulnerable configuration
allRemove SIP Session and Router ALG profiles from Message Routing virtual servers
tmsh modify ltm virtual <vs_name> profiles delete { sip-session router-alg }
Block SIP traffic temporarily
allUse iRules or firewall rules to block SIP traffic to vulnerable virtual servers
when CLIENT_ACCEPTED { if {[TCP::local_port] == 5060} { reject } }
🧯 If You Can't Patch
- Remove SIP Session and Router ALG profiles from Message Routing virtual servers
- Implement network filtering to block malformed SIP packets before reaching BIG-IP
🔍 How to Verify
Check if Vulnerable:
Check if Message Routing virtual servers have both SIP Session and Router ALG profiles: 'tmsh list ltm virtual <vs_name> profiles'
Check Version:
tmsh show sys version | grep Version
Verify Fix Applied:
Verify version is patched: 'tmsh show sys version' and check for fix versions
📡 Detection & Monitoring
Log Indicators:
- TMM restart messages in /var/log/ltm
- SIP parsing errors in application logs
- Virtual server state changes
Network Indicators:
- SIP traffic spikes followed by service interruption
- TCP resets on SIP ports
SIEM Query:
source="/var/log/ltm" "TMM.*terminated" OR "TMM.*restart"