First published: Wed May 07 2025(Updated: )
When HTTP/2 client and server profile is configured on a virtual server, undisclosed requests can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Next | 2.0.0 | |
F5 BIG-IP Next | >=1.8.0<=1.9.2>=1.7.0<=1.7.8 | 1.7.9 |
F5 BIG-IP Next | 2.0.0 | |
F5 BIG-IP Next | >=1.1.0<=1.3.3 | 1.4.0 |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | 17.1.2 |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.4 | 16.1.5 |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-41414 has a critical severity rating due to potential impact on the availability of the affected F5 products.
To fix CVE-2025-41414, upgrade to the recommended versions specified by F5, such as 2.0.0 or 17.1.2.
CVE-2025-41414 affects several versions of F5 BIG-IP and BIG-IP Next SPK and CNF products, as detailed in the advisory.
CVE-2025-41414 may allow unprivileged remote attackers to cause a denial of service through undisclosed HTTP/2 requests.
Yes, CVE-2025-41414 specifically affects F5 BIG-IP and related products with HTTP/2 profiles configured.