First published: Wed Feb 05 2025(Updated: )
When a BIG-IP PEM Control Plane Listener virtual server is configured with a Diameter Endpoint profile, undisclosed traffic can cause the virtual server to stop processing new client connections and cause an increase in memory resource utilization.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Policy Enforcement Manager | >=17.1.0<=17.1.1 | 17.1.2 |
F5 BIG-IP Policy Enforcement Manager | >=16.1.0<=16.1.4 | 16.1.5 |
F5 BIG-IP Policy Enforcement Manager | >=15.1.0<=15.1.10 | - |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22891 has been classified as a moderate severity vulnerability affecting F5 BIG-IP (PEM) configurations.
To mitigate CVE-2025-22891, upgrade to the patched versions of F5 BIG-IP (PEM) listed in the advisory: 17.1.2, 16.1.5, or applicable updates for earlier versions.
The symptoms of CVE-2025-22891 include the BIG-IP PEM Control Plane Listener virtual server failing to process new client connections and an increase in memory resource utilization.
CVE-2025-22891 affects F5 BIG-IP (PEM) versions 15.1.0 through 15.1.10, 16.1.0 through 16.1.4, and 17.1.0 through 17.1.1.
Yes, CVE-2025-22891 specifically impacts configurations where the BIG-IP PEM Control Plane Listener virtual server is set up with a Diameter Endpoint profile.