PT-2025-42353 · F5 · F5 Big-Ip
Published
2025-10-15
·
Updated
2025-10-21
·
CVE-2025-61951
CVSS v4.0
8.7
High
| AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Name of the Vulnerable Software and Affected Versions
F5 BIG-IP (affected versions not specified)
Description
An out-of-bounds read within the Traffic Management Microkernel (TMM) component can lead to a denial-of-service condition. This issue arises when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled alongside a Server SSL profile configured with a certificate, key, and the SSL Sign Hash set to ANY, and the backend server also supports DTLS 1.2 with client authentication. The issue may cause the TMM to terminate.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
F5 Big-Ip