CVE-2025-54854
F5 BIG-IP Virtual Edition (tier - best) vulnerability analysis and mitigation

Overview

When a BIG-IP APM OAuth access profile (Resource Server or Resource Client) is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate. The vulnerability, identified as CVE-2025-54854, affects F5's BIG-IP Access Policy Manager (APM) product line. The issue was disclosed on October 15, 2025, as part of F5's response to a broader security incident involving a nation-state actor (F5 Advisory).

Technical details

The vulnerability has received a CVSS v4.0 base score of 8.7 HIGH (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) and a CVSS v3.1 base score of 7.5 HIGH (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The vulnerability specifically affects the apmd process when certain OAuth configurations are in place, potentially leading to service termination (NVD).

Impact

The primary impact of this vulnerability is the potential termination of the apmd process, which could result in a denial of service condition for the BIG-IP APM functionality. This affects organizations using BIG-IP APM with OAuth access profiles configured on their virtual servers (NVD).

Mitigation and workarounds

F5 has released patches for affected versions as part of their October 2025 Quarterly Security Notification. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 26-01, requiring federal agencies to inventory F5 deployments, patch affected systems by October 22 and October 31, and submit inventory reports by October 29, 2025 (Lansweeper).

Community reactions

The security community has responded with heightened concern due to this vulnerability being disclosed alongside F5's announcement of a nation-state actor breach. The incident has prompted immediate action from CISA and widespread industry attention, particularly because the threat actor had access to source code and vulnerability information (Tenable Blog).

Additional resources


SourceThis report was generated using AI

Related F5 BIG-IP Virtual Edition (tier - best) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61990HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_application_security_manager
NoYesOct 15, 2025
CVE-2025-61935HIGH8.7
  • F5 BIG-IP Virtual Edition (tier - best)F5 BIG-IP Virtual Edition (tier - best)
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-58071HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_domain_name_system
NoYesOct 15, 2025
CVE-2025-61974HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-61933MEDIUM5.1
  • F5 BIG-IP Virtual Edition (tier - best)F5 BIG-IP Virtual Edition (tier - best)
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management