CVE-2025-54854

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause denial of service by sending specific traffic to BIG-IP APM systems with OAuth access profiles configured. The apmd process terminates, disrupting application access. Organizations running affected F5 BIG-IP APM versions with OAuth profiles are impacted.

💻 Affected Systems

Products:
  • F5 BIG-IP APM
Versions: Affected versions not specified in CVE; consult F5 advisory K000156602 for specific version ranges.
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when OAuth access profile (Resource Server or Resource Client) is configured on a virtual server. Systems without OAuth profiles are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for applications behind the affected virtual server, requiring manual intervention to restore service.

🟠

Likely Case

Intermittent service disruptions and degraded performance as the apmd process restarts, potentially causing application timeouts.

🟢

If Mitigated

Minimal impact with proper network segmentation and traffic filtering preventing malicious packets from reaching vulnerable systems.

🌐 Internet-Facing: HIGH - Internet-facing BIG-IP APM systems with OAuth profiles are directly exposed to potential DoS attacks from untrusted sources.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but attack surface is reduced; requires internal attacker or compromised internal host.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Undisclosed traffic triggers the vulnerability, suggesting specific packet crafting is required but complexity appears low based on CVSS and description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific fixed versions available in F5 advisory K000156602

Vendor Advisory: https://my.f5.com/manage/s/article/K000156602

Restart Required: Yes

Instructions:

1. Review F5 advisory K000156602 for affected versions. 2. Upgrade to fixed version per F5 documentation. 3. Restart BIG-IP services after patching. 4. Verify OAuth functionality post-upgrade.

🔧 Temporary Workarounds

Remove OAuth profiles

all

Temporarily remove OAuth access profiles from vulnerable virtual servers to eliminate attack vector.

tmsh delete ltm virtual <virtual_server_name> profiles oauth-profile

Network filtering

all

Implement network ACLs to restrict traffic to affected virtual servers from trusted sources only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Deploy WAF or IPS with DoS protection rules in front of vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check if BIG-IP APM has OAuth access profiles configured on virtual servers using: tmsh list ltm virtual one-line | grep oauth

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify version is updated to fixed release: tmsh show sys version | grep Version

📡 Detection & Monitoring

Log Indicators:

  • apmd process termination logs in /var/log/apm
  • Increased apmd restart events in system logs
  • Application access failures correlating with apmd crashes

Network Indicators:

  • Unusual traffic patterns to OAuth endpoints
  • Increased TCP resets or connection failures to APM virtual servers

SIEM Query:

source="*apm*" AND ("terminated" OR "crashed" OR "restarting") AND process="apmd"

🔗 References

📤 Share & Export