CVE-2025-58153
F5 BIG-IP Virtual Edition vulnerability analysis and mitigation

Overview

CVE-2025-58153 is a vulnerability affecting hardware systems with a High-Speed Bridge (HSB) in F5's BIG-IP products. Under specific undisclosed traffic conditions and circumstances beyond attacker control, the HSB may experience a lockup. The vulnerability was discovered as part of a broader security incident disclosed by F5 on October 15, 2025, where a nation-state threat actor had gained access to F5's systems (NVD, Tenable Blog).

Technical details

The vulnerability has received multiple CVSS scores from different sources. The CVSS 4.0 score is 8.2 (HIGH) with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L, while the CVSS 3.1 base score is 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vulnerability is classified under CWE-667 (Improper Locking) and CWE-703 (Improper Check or Handling of Exceptional Conditions) (NVD).

Impact

The primary impact of this vulnerability is on system availability, as indicated by the CVSS scores showing high impact on availability (VA:H) with no direct impact on confidentiality or integrity. When exploited, the vulnerability can cause a lockup of the High-Speed Bridge, potentially affecting system operations (NVD).

Mitigation and workarounds

F5 has released patches as part of their October 2025 Quarterly Security Notification. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive (ED) 26-01, requiring federal agencies to apply all available updates immediately. Organizations are strongly urged to update their BIG-IP software as soon as possible (Tenable Blog).

Community reactions

The vulnerability disclosure came as part of a larger security incident where F5 revealed that a nation-state threat actor had maintained long-term access to their environment and exfiltrated portions of BIG-IP source code. This prompted immediate response from CISA through Emergency Directive 26-01, highlighting the severity of the situation (Lansweeper).

Additional resources


SourceThis report was generated using AI

Related F5 BIG-IP Virtual Edition vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61990HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-58071HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-61974HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-61951HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-61958HIGH8.5
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_local_traffic_manager
NoYesOct 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management