When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000151596 |
|
History
Tue, 21 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5 big-ip Next Cloud-native Network Functions
F5 big-ip Next For Kubernetes |
|
| CPEs | cpe:2.3:a:f5:big-ip_next_cloud-native_network_functions:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_next_for_kubernetes:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
F5 big-ip Next Cloud-native Network Functions
F5 big-ip Next For Kubernetes |
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 big-ip F5 big-ip Next F5 big-ip Next Service Proxy For Kubernetes F5 big Ip |
|
| Vendors & Products |
F5
F5 big-ip F5 big-ip Next F5 big-ip Next Service Proxy For Kubernetes F5 big Ip |
Wed, 15 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | TMM Vulnerability | |
| Weaknesses | CWE-401 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published: 2025-10-15T13:55:48.872Z
Updated: 2025-10-16T03:56:47.323Z
Reserved: 2025-10-03T23:04:21.132Z
Link: CVE-2025-54805
Updated: 2025-10-15T15:37:12.136Z
Status : Analyzed
Published: 2025-10-15T14:15:49.810
Modified: 2025-10-21T20:14:45.210
Link: CVE-2025-54805
No data.