CVE-2025-61960

7.5 HIGH

📋 TL;DR

A vulnerability in F5 BIG-IP APM allows undisclosed traffic to cause the Traffic Management Microkernel (TMM) to terminate when per-request policies are configured on portal access virtual servers. This affects BIG-IP APM users with specific configurations. Systems running end-of-technical-support versions are not evaluated but may be vulnerable.

💻 Affected Systems

Products:
  • F5 BIG-IP APM
Versions: Specific versions not disclosed in public advisory; refer to F5 K000156597 for details
Operating Systems: F5 TMOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when per-request policies are configured on portal access virtual servers. End-of-Technical-Support versions are not evaluated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for all traffic through affected virtual servers, requiring manual intervention to restart TMM processes.

🟠

Likely Case

Intermittent service disruption affecting portal access functionality when specific traffic patterns trigger the condition.

🟢

If Mitigated

Minimal impact with proper network segmentation and traffic filtering in place.

🌐 Internet-Facing: HIGH - Portal access virtual servers are typically internet-facing and directly exposed to attack traffic.
🏢 Internal Only: MEDIUM - Internal systems could still be affected by malicious or malformed internal traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Undisclosed traffic can trigger the condition without authentication. Specific exploit details are not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to F5 K000156597 for specific fixed versions

Vendor Advisory: https://my.f5.com/manage/s/article/K000156597

Restart Required: Yes

Instructions:

1. Review F5 advisory K000156597 for affected versions. 2. Upgrade to fixed version listed in advisory. 3. Restart TMM processes after upgrade. 4. Verify configuration compatibility.

🔧 Temporary Workarounds

Remove per-request policies

all

Temporarily remove per-request policies from portal access virtual servers to mitigate vulnerability

tmsh modify ltm virtual <virtual_server_name> policies remove { <policy_name> }

Implement traffic filtering

all

Use iRules or network controls to filter suspicious traffic patterns

when HTTP_REQUEST { if { [HTTP::uri] contains "malicious_pattern" } { reject } }

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected virtual servers
  • Deploy additional monitoring and alerting for TMM process restarts

🔍 How to Verify

Check if Vulnerable:

Check if per-request policies are configured on portal access virtual servers: tmsh list ltm virtual <name> policies

Check Version:

tmsh show sys version

Verify Fix Applied:

Verify BIG-IP version is updated to fixed version and TMM processes are stable

📡 Detection & Monitoring

Log Indicators:

  • TMM process termination events in /var/log/ltm
  • Unexpected virtual server restarts
  • High CPU/memory usage before crashes

Network Indicators:

  • Unusual traffic patterns to portal access endpoints
  • Increased connection resets

SIEM Query:

source="*/var/log/ltm*" AND "TMM terminated" OR "segmentation fault"

🔗 References

📤 Share & Export