CVE-2025-41433
F5 BIG-IP Virtual Edition (tier - best) vulnerability analysis and mitigation

Overview

When a Session Initiation Protocol (SIP) message routing framework (MRF) application layer gateway (ALG) profile is configured on a Message Routing virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This vulnerability has been assigned CVE-2025-41433 and was disclosed on May 7, 2025 (NVD).

Technical details

The vulnerability has been assigned a CVSS v4.0 base score of 8.7 HIGH (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L) and CVSS v3.1 base score of 7.5 HIGH (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The vulnerability is classified as a NULL Pointer Dereference (CWE-476) (NVD).

Impact

The vulnerability affects the availability of the system by causing the Traffic Management Microkernel (TMM) to terminate when processing certain undisclosed requests. This can lead to service disruption (NVD).

Mitigation and workarounds

Software versions which have reached End of Technical Support (EoTS) are not evaluated. Users should refer to F5 Networks' official security advisory for specific mitigation steps and affected versions (F5 Article).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management