When BIG-IP Advanced WAF is configured on a virtual server with Server-Side Request Forgery (SSRF) protection or when an NGINX server is configured with App Protect Bot Defense, undisclosed requests can disrupt new client requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://my.f5.com/manage/s/article/K000148512 |
|
History
Wed, 22 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5 big-ip Advanced Web Application Firewall
F5 big-ip Application Security Manager |
|
| CPEs | cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
F5 big-ip Advanced Web Application Firewall
F5 big-ip Application Security Manager |
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 big-ip F5 nginx App Protect Nginx Nginx nginx |
|
| Vendors & Products |
F5
F5 big-ip F5 nginx App Protect Nginx Nginx nginx |
Wed, 15 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When BIG-IP Advanced WAF is configured on a virtual server with Server-Side Request Forgery (SSRF) protection or when an NGINX server is configured with App Protect Bot Defense, undisclosed requests can disrupt new client requests. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | BIG-IP Advanced WAF and ASM and NGINX App Protect DNS lookup vulnerability | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published: 2025-10-15T13:55:43.347Z
Updated: 2025-10-16T03:56:40.663Z
Reserved: 2025-10-06T23:17:24.062Z
Link: CVE-2025-58474
Updated: 2025-10-15T15:45:19.332Z
Status : Analyzed
Published: 2025-10-15T14:15:53.087
Modified: 2025-10-22T21:00:17.313
Link: CVE-2025-58474
No data.