CVE-2025-55669

7.5 HIGH

📋 TL;DR

A vulnerability in F5 BIG-IP Advanced WAF and ASM allows undisclosed HTTP/2 traffic to cause the Traffic Management Microkernel (TMM) to terminate when specific configurations are present. This affects systems running vulnerable versions with both a security policy and server-side HTTP/2 profile configured. The vulnerability leads to denial of service.

💻 Affected Systems

Products:
  • F5 BIG-IP Advanced WAF
  • F5 BIG-IP ASM
Versions: Specific versions not detailed in advisory; check F5 article for exact affected versions
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Requires both a security policy AND a server-side HTTP/2 profile configured on the virtual server. Systems with only one of these configurations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage for affected virtual servers, potentially disrupting critical applications and services.

🟠

Likely Case

Intermittent service disruptions and performance degradation due to TMM restarts.

🟢

If Mitigated

Minimal impact if proper network segmentation and monitoring are in place to detect and respond to TMM failures.

🌐 Internet-Facing: HIGH - HTTP/2 traffic from external sources can trigger the vulnerability, potentially causing service disruption.
🏢 Internal Only: MEDIUM - Internal HTTP/2 traffic could also trigger the vulnerability, but attack surface is more limited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Sending specific HTTP/2 traffic to trigger the condition

Undisclosed traffic pattern required; no authentication needed to send HTTP/2 requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000150752 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000150752

Restart Required: Yes

Instructions:

1. Review F5 advisory K000150752 for affected versions. 2. Download and apply the appropriate patch from F5 Downloads. 3. Restart TMM services after patching. 4. Verify the fix by testing HTTP/2 functionality.

🔧 Temporary Workarounds

Disable HTTP/2 Server Profile

all

Remove or disable the server-side HTTP/2 profile from vulnerable virtual servers

tmsh modify ltm virtual <virtual_server_name> profiles delete { <http2_profile_name> }

Implement Rate Limiting

all

Apply rate limiting to HTTP/2 traffic to reduce attack surface

tmsh create ltm policy rate-limit-http2 rules add { http2_traffic { http-request rate-limit 100 per-second } }

🧯 If You Can't Patch

  • Remove server-side HTTP/2 profiles from vulnerable virtual servers
  • Implement network segmentation to restrict HTTP/2 traffic to trusted sources only

🔍 How to Verify

Check if Vulnerable:

Check virtual server configuration for both security policy and server-side HTTP/2 profile: tmsh list ltm virtual <name> | grep -E 'profiles|policy'

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify patch version and test HTTP/2 traffic to ensure TMM remains stable

📡 Detection & Monitoring

Log Indicators:

  • TMM termination/restart events in /var/log/ltm
  • Unexpected virtual server downtime logs

Network Indicators:

  • Spike in HTTP/2 traffic followed by service interruption
  • TCP connection resets from affected virtual servers

SIEM Query:

source="*/var/log/ltm*" AND "TMM terminated" OR "TMM restarting"

🔗 References

📤 Share & Export