CVE-2025-61951

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause denial of service by sending undisclosed traffic to F5 BIG-IP systems with specific DTLS configurations. The Traffic Management Microkernel (TMM) terminates when exploited, disrupting traffic management services. Affected systems are F5 BIG-IP devices running vulnerable versions with DTLS 1.2 virtual servers configured with specific SSL profile settings.

💻 Affected Systems

Products:
  • F5 BIG-IP
Versions: Versions prior to the fixed version (specific versions not provided in CVE description)
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when: 1) DTLS 1.2 virtual server is enabled, 2) Server SSL profile configured with certificate, key, and SSL Sign Hash set to ANY, 3) Backend server enabled with DTLS 1.2 and client authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of all traffic managed by the affected BIG-IP system, potentially affecting multiple applications and services simultaneously.

🟠

Likely Case

Targeted denial of service against specific DTLS-enabled services, causing intermittent outages for applications using DTLS 1.2 with the vulnerable configuration.

🟢

If Mitigated

Minimal impact if systems are patched or the vulnerable configuration is not in use.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific undisclosed traffic to vulnerable configurations. No authentication required to trigger the TMM termination.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check F5 advisory K000151309 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000151309

Restart Required: Yes

Instructions:

1. Review F5 advisory K000151309 for affected versions. 2. Upgrade to recommended fixed version. 3. Restart TMM services after upgrade. 4. Verify configuration changes persist.

🔧 Temporary Workarounds

Disable vulnerable DTLS configuration

all

Modify SSL profile to not use 'ANY' for SSL Sign Hash or disable DTLS 1.2 virtual servers with the vulnerable configuration

tmsh modify ltm profile client-ssl <profile_name> sign-hash <specific_hash>
tmsh modify ltm virtual <virtual_name> profiles remove { <dtls_profile> }

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to DTLS virtual servers
  • Deploy rate limiting or WAF rules to detect and block suspicious DTLS traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check if DTLS 1.2 virtual servers exist with SSL profiles configured with certificate, key, and SSL Sign Hash set to ANY, and backend servers with DTLS 1.2 and client authentication enabled.

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify upgraded version matches F5's fixed version list and confirm vulnerable configuration is no longer present.

📡 Detection & Monitoring

Log Indicators:

  • TMM process termination logs
  • Unexpected service restarts in /var/log/ltm
  • DTLS connection failures

Network Indicators:

  • Sudden drop in DTLS traffic
  • Increased DTLS connection attempts to specific ports

SIEM Query:

source="f5_bigip" AND (event_type="process_termination" OR message="TMM")

🔗 References

📤 Share & Export