Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-53474

CVE-2025-53474: F5 BIG-IP APM DoS Vulnerability

CVE-2025-53474 is a denial of service vulnerability in F5 BIG-IP Access Policy Manager where iRule with ILX::call commands can crash TMM. This article covers technical details, affected versions, impact, and mitigation.

Published: April 14, 2026

CVE-2025-53474 Overview

CVE-2025-53474 is a denial of service vulnerability affecting F5 BIG-IP products when an iRule using an ILX::call command is configured on a virtual server. When exploited, undisclosed traffic patterns can cause the Traffic Management Microkernel (TMM) to terminate unexpectedly, resulting in service disruption. The TMM is a critical component responsible for handling all network traffic passing through BIG-IP devices, making this vulnerability particularly impactful for organizations relying on these appliances for application delivery and security.

Critical Impact

Successful exploitation causes TMM termination, leading to complete traffic processing failure and potential service outages for all applications behind the affected BIG-IP device.

Affected Products

  • F5 BIG-IP Local Traffic Manager (LTM)
  • F5 BIG-IP Access Policy Manager (APM)
  • F5 BIG-IP Advanced Firewall Manager (AFM)
  • F5 BIG-IP Application Security Manager (ASM)
  • F5 BIG-IP Advanced Web Application Firewall (AWAF)
  • F5 BIG-IP Domain Name System (DNS)
  • F5 BIG-IP SSL Orchestrator
  • F5 BIG-IP Analytics
  • F5 BIG-IP Application Acceleration Manager (AAM)
  • F5 BIG-IP Application Visibility and Reporting (AVR)
  • F5 BIG-IP Carrier-Grade NAT (CGNAT)
  • F5 BIG-IP DDoS Hybrid Defender
  • F5 BIG-IP Edge Gateway
  • F5 BIG-IP Fraud Protection Service
  • F5 BIG-IP Global Traffic Manager (GTM)
  • F5 BIG-IP Link Controller
  • F5 BIG-IP Policy Enforcement Manager (PEM)
  • F5 BIG-IP WebAccelerator
  • F5 BIG-IP WebSafe
  • F5 BIG-IP Automation Toolchain
  • F5 BIG-IP Container Ingress Services

Discovery Timeline

  • October 15, 2025 - CVE-2025-53474 published to NVD
  • October 21, 2025 - Last updated in NVD database

Technical Details for CVE-2025-53474

Vulnerability Analysis

This vulnerability is classified under CWE-120 (Buffer Copy without Checking Size of Input), commonly known as a buffer overflow vulnerability. The issue exists within the Traffic Management Microkernel (TMM) component of F5 BIG-IP devices. The TMM is the data plane process responsible for processing all traffic that passes through the BIG-IP system.

When an iRule containing the ILX::call command is attached to a virtual server, certain traffic patterns can trigger improper memory handling within TMM. The ILX::call command is used to invoke Node.js functions from within iRules, enabling custom application logic through the iRules Language eXtension (ILX) framework. The vulnerability appears to manifest when processing specific, undisclosed traffic that interacts with the ILX subsystem, causing memory corruption that results in TMM process termination.

The exploitation requires no authentication and can be triggered remotely over the network. An attacker does not need any privileges or user interaction to exploit this vulnerability, making it a significant threat to exposed BIG-IP deployments that utilize ILX functionality.

Root Cause

The root cause is a buffer overflow condition (CWE-120) in the TMM process when handling traffic destined for virtual servers with iRules configured to use the ILX::call command. The vulnerability occurs due to insufficient bounds checking when processing input data, allowing specially crafted traffic to overflow memory buffers and cause TMM to crash. Software versions that have reached End of Technical Support (EoTS) are not evaluated for this vulnerability.

Attack Vector

The attack vector is network-based, requiring an attacker to send specifically crafted traffic to a BIG-IP virtual server configured with an iRule that uses the ILX::call command. The attack can be performed remotely without authentication, and no user interaction is required.

The exploitation scenario involves:

  1. Identifying a BIG-IP device with a virtual server utilizing ILX functionality
  2. Crafting network traffic that triggers the buffer overflow condition
  3. Sending the malicious traffic to the target virtual server
  4. TMM processes the traffic and encounters the overflow, causing termination
  5. Traffic processing halts until TMM restarts, causing service disruption

Since the specific traffic pattern required to trigger the vulnerability is undisclosed, detailed exploitation code is not publicly available. Organizations should refer to the F5 Security Article K44517780 for technical details and recommended mitigations.

Detection Methods for CVE-2025-53474

Indicators of Compromise

  • Unexpected TMM process restarts in /var/log/ltm logs
  • Core dump files generated by TMM crashes in /var/core/
  • Elevated or unusual traffic patterns targeting virtual servers with ILX iRules
  • Service interruptions correlated with specific traffic flows

Detection Strategies

  • Monitor for TMM restart events using log analysis and alerting on the message pattern "tmm.*restart" in system logs
  • Implement network traffic analysis to identify anomalous patterns targeting BIG-IP virtual servers
  • Configure SNMP traps or syslog alerts for TMM process state changes
  • Review iRule configurations to identify virtual servers using ILX::call commands that may be vulnerable

Monitoring Recommendations

  • Enable enhanced logging for TMM events and forward logs to a centralized SIEM solution
  • Configure BIG-IP high availability (HA) failover alerting to detect unplanned failover events
  • Implement real-time monitoring of TMM process health using F5 iHealth or similar tools
  • Set up automated alerts for core dump generation on BIG-IP devices

How to Mitigate CVE-2025-53474

Immediate Actions Required

  • Review all iRule configurations to identify virtual servers using ILX::call commands
  • Evaluate whether ILX functionality is essential for business operations; disable if not required
  • Apply vendor-provided patches or hotfixes as soon as they become available
  • Implement network segmentation to limit exposure of BIG-IP management and data plane interfaces

Patch Information

F5 has published security guidance for this vulnerability. Organizations should consult the F5 Security Article K44517780 for specific patch versions and remediation instructions. Ensure all BIG-IP devices are running supported software versions, as products that have reached End of Technical Support (EoTS) are not evaluated or patched.

Workarounds

  • Temporarily remove or disable iRules containing ILX::call commands until patches can be applied
  • Implement rate limiting on virtual servers to reduce the impact of potential exploitation attempts
  • Configure BIG-IP device mirroring or HA pairs to minimize service disruption during TMM restarts
  • Use external web application firewalls or intrusion prevention systems to filter potentially malicious traffic
bash
# Example: List iRules using ILX::call commands
tmsh list ltm rule | grep -B5 "ILX::call"

# Example: Disable a specific iRule temporarily
tmsh modify ltm virtual <virtual_server_name> rules none

# Example: Monitor TMM restarts in real-time
tail -f /var/log/ltm | grep -i "tmm"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechF5 Big Ip Access Policy Manager

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-120

  • NVD-CWE-noinfo
  • Vendor Resources
  • F5 Security Article K44517780
  • Related CVEs
  • CVE-2021-22991: F5 BIG-IP Access Policy Manager DoS Flaw

  • CVE-2025-59781: F5 BIG-IP APM DoS Vulnerability

  • CVE-2025-61951: F5 BIG-IP Access Policy Manager DoS Flaw

  • CVE-2025-53856: F5 BIG-IP Access Policy Manager DOS Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English