
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-41431 was discovered and disclosed on May 7, 2025, affecting BIG-IP systems when connection mirroring is configured on a virtual server. The vulnerability impacts the Traffic Management Microkernel (TMM) in standby BIG-IP systems within a traffic group (NVD, Wiz).
The vulnerability is classified as an Out-of-bounds Write (CWE-787) issue with a CVSS v4.0 base score of 8.7 HIGH and CVSS v3.1 base score of 7.5 HIGH. The vulnerability is network-accessible (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N) (NVD, Wiz).
When exploited, the vulnerability allows undisclosed requests to cause the Traffic Management Microkernel (TMM) to terminate in the standby BIG-IP systems that are part of a traffic group. The CVSS metrics indicate high impact on availability (VA:H) but no impact on confidentiality or integrity (NVD, Wiz).
F5 Networks has documented this vulnerability and provided mitigation information through their security advisory. Software versions that have reached End of Technical Support (EoTS) are not evaluated (F5 Article).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."