CVE-2025-58096

7.5 HIGH

📋 TL;DR

A configuration-specific vulnerability in F5 BIG-IP systems where setting the tm.tcpudptxchecksum database variable to 'Software-only' (non-default) can cause the Traffic Management Microkernel (TMM) to terminate when processing undisclosed traffic. This affects BIG-IP administrators who have changed this specific setting from its default value.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Specific versions not disclosed in CVE description; refer to F5 advisory K000156691 for affected versions
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when tm.tcpudptxchecksum database variable is explicitly configured to 'Software-only' (non-default setting)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete TMM termination leading to denial of service for all traffic processed by BIG-IP, potentially disrupting critical network services and applications.

🟠

Likely Case

Intermittent TMM crashes causing service disruptions and requiring manual intervention to restore functionality.

🟢

If Mitigated

No impact if the tm.tcpudptxchecksum variable remains at default setting or if affected systems are patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific traffic to trigger the condition; no authentication needed but requires knowledge of vulnerable configuration

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to F5 advisory K000156691 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000156691

Restart Required: Yes

Instructions:

1. Review F5 advisory K000156691 for affected versions. 2. Upgrade to patched version. 3. Restart TMM services. 4. Verify configuration remains secure.

🔧 Temporary Workarounds

Revert to default checksum setting

all

Change tm.tcpudptxchecksum database variable back to default value

tmsh modify sys db tm.tcpudptxchecksum value default

🧯 If You Can't Patch

  • Ensure tm.tcpudptxchecksum database variable is set to default value (not 'Software-only')
  • Implement network segmentation to limit traffic exposure to BIG-IP systems

🔍 How to Verify

Check if Vulnerable:

Check current tm.tcpudptxchecksum setting: tmsh list sys db tm.tcpudptxchecksum | grep value

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify version is patched per F5 advisory and tm.tcpudptxchecksum is not set to 'Software-only'

📡 Detection & Monitoring

Log Indicators:

  • TMM process termination/crash logs
  • High availability failover events
  • System log entries indicating TMM restarts

Network Indicators:

  • Sudden traffic drops through BIG-IP
  • Increased latency or connection failures

SIEM Query:

source="bigip_logs" AND ("TMM terminated" OR "TMM crash" OR "failover event")

🔗 References

📤 Share & Export