CVE-2025-48008

7.5 HIGH

📋 TL;DR

This vulnerability affects F5 BIG-IP systems with TCP profiles configured with Multipath TCP (MPTCP) enabled on virtual servers. Under specific traffic conditions, it causes the Traffic Management Microkernel (TMM) to terminate, leading to denial of service. Only systems running supported software versions are affected.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Supported versions with MPTCP capability (specific versions not detailed in reference)
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when TCP profile with MPTCP enabled is configured on a virtual server. End-of-Technical-Support versions are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption as TMM terminates, causing all traffic management functions to fail on affected virtual servers.

🟠

Likely Case

Intermittent service outages when specific MPTCP traffic patterns occur, requiring TMM restarts.

🟢

If Mitigated

No impact if MPTCP is disabled or systems are patched.

🌐 Internet-Facing: HIGH - Internet-facing virtual servers with MPTCP enabled are directly exposed to potential DoS attacks.
🏢 Internal Only: MEDIUM - Internal systems could be affected by legitimate MPTCP traffic causing accidental DoS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires specific traffic conditions beyond attacker's control, making reliable exploitation challenging.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to F5 advisory K000150614 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000150614

Restart Required: Yes

Instructions:

1. Review F5 advisory K000150614. 2. Identify affected BIG-IP versions. 3. Apply recommended patches from F5 downloads. 4. Restart TMM services.

🔧 Temporary Workarounds

Disable MPTCP on TCP profiles

all

Remove Multipath TCP configuration from vulnerable TCP profiles

tmsh modify ltm profile tcp <profile-name> multipath-tcp disabled

🧯 If You Can't Patch

  • Disable MPTCP on all TCP profiles immediately
  • Implement network controls to block MPTCP traffic to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check if any TCP profiles have multipath-tcp enabled: tmsh list ltm profile tcp multipath-tcp

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify patch version matches F5 advisory and confirm MPTCP is disabled or system is patched

📡 Detection & Monitoring

Log Indicators:

  • TMM process termination logs
  • Unexpected service restarts in /var/log/ltm

Network Indicators:

  • MPTCP traffic patterns to BIG-IP systems
  • Service disruption on MPTCP-enabled virtual servers

SIEM Query:

source="*/var/log/ltm*" AND "TMM terminated" OR "multipath-tcp"

🔗 References

📤 Share & Export