Quarterly security updates: F5 equips BIG-IP appliances against possible attacks

The F5 developers have closed several security vulnerabilities in BIG-IP Next and BIG-IQ, among others. Malicious code may be executed.

listen Print view
An appliance connects many clients with cables through the cloud. You and a few clients burn.

(Image: Bild erstellt mit KI in Bing Image Creator durch heise online / dmk)

1 min. read

Network admins with BIG-IP appliances should study the additional information on the quarterly security updates from F5. The developers have closed various software vulnerabilities that attackers can use to cause devices to crash, for example.

In an article on the collective update, the network supplier lists the affected products and the respective security updates. A complete list is beyond the scope of this report. For example, the iControl REST component (CVE-2025-20029 “high”) of BIG-IP (all modules) is vulnerable.

At this point, a remote authenticated attacker can use a crafted request to execute their commands at system level. The creation and deletion of files is also conceivable at this point.

If the routing profile of BIG-IP is configured on a virtual server, the processing of data traffic can lead to an excessive amount of memory being used (CVE-2025-20058 “high”). This often ends in a DoS state, which leads to crashes. In the worst case, appliances then stop processing traffic and network problems occur.

Videos by heise

Even if there are currently no signs of attacks, administrators should install the security updates promptly to prepare company networks against possible attacks.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.