When the BIG-IP system is configured as both a Security Assertion Markup Language (SAML) service provider (SP) and Identity Provider (IdP), with single logout (SLO) enabled on an access policy, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000148816 |
|
History
Tue, 21 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5 big-ip Access Policy Manager
F5 big-ip Ssl Orchestrator |
|
| CPEs | cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:17.5.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.5.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
F5 big-ip Access Policy Manager
F5 big-ip Ssl Orchestrator |
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 big-ip |
|
| Vendors & Products |
F5
F5 big-ip |
Wed, 15 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When the BIG-IP system is configured as both a Security Assertion Markup Language (SAML) service provider (SP) and Identity Provider (IdP), with single logout (SLO) enabled on an access policy, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | BIG-IP APM and SSL Orchestrator vulnerability | |
| Weaknesses | CWE-404 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published: 2025-10-15T13:55:42.932Z
Updated: 2025-10-16T03:56:50.380Z
Reserved: 2025-10-03T23:04:03.858Z
Link: CVE-2025-47148
Updated: 2025-10-15T15:45:53.484Z
Status : Analyzed
Published: 2025-10-15T14:15:47.637
Modified: 2025-10-21T18:53:54.733
Link: CVE-2025-47148
No data.