When a BIG-IP LTM Client SSL profile is configured on a virtual server with SSL Forward Proxy enabled and Anonymous Diffie-Hellman (ADH) ciphers enabled, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000141436 |
|
History
Tue, 21 Oct 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5 big-ip Access Policy Manager
F5 big-ip Advanced Firewall Manager F5 big-ip Advanced Web Application Firewall F5 big-ip Analytics F5 big-ip Application Acceleration Manager F5 big-ip Application Security Manager F5 big-ip Application Visibility And Reporting F5 big-ip Automation Toolchain F5 big-ip Carrier-grade Nat F5 big-ip Container Ingress Services F5 big-ip Ddos Hybrid Defender F5 big-ip Domain Name System F5 big-ip Edge Gateway F5 big-ip Fraud Protection Service F5 big-ip Global Traffic Manager F5 big-ip Link Controller F5 big-ip Local Traffic Manager F5 big-ip Policy Enforcement Manager F5 big-ip Ssl Orchestrator F5 big-ip Webaccelerator F5 big-ip Websafe |
|
| CPEs | cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
F5 big-ip Access Policy Manager
F5 big-ip Advanced Firewall Manager F5 big-ip Advanced Web Application Firewall F5 big-ip Analytics F5 big-ip Application Acceleration Manager F5 big-ip Application Security Manager F5 big-ip Application Visibility And Reporting F5 big-ip Automation Toolchain F5 big-ip Carrier-grade Nat F5 big-ip Container Ingress Services F5 big-ip Ddos Hybrid Defender F5 big-ip Domain Name System F5 big-ip Edge Gateway F5 big-ip Fraud Protection Service F5 big-ip Global Traffic Manager F5 big-ip Link Controller F5 big-ip Local Traffic Manager F5 big-ip Policy Enforcement Manager F5 big-ip Ssl Orchestrator F5 big-ip Webaccelerator F5 big-ip Websafe |
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 big-ip |
|
| Vendors & Products |
F5
F5 big-ip |
Wed, 13 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Aug 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When a BIG-IP LTM Client SSL profile is configured on a virtual server with SSL Forward Proxy enabled and Anonymous Diffie-Hellman (ADH) ciphers enabled, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | BIG-IP Client SSL profile vulnerability | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published: 2025-08-13T14:46:53.883Z
Updated: 2025-08-13T19:43:53.673Z
Reserved: 2025-07-29T17:12:25.007Z
Link: CVE-2025-52585
Updated: 2025-08-13T19:43:50.421Z
Status : Analyzed
Published: 2025-08-13T15:15:35.170
Modified: 2025-10-21T18:25:29.223
Link: CVE-2025-52585
No data.