When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000151596 |
![]() ![]() |
History
Tue, 21 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5 big-ip Next Cloud-native Network Functions
F5 big-ip Next For Kubernetes |
|
CPEs | cpe:2.3:a:f5:big-ip_next_cloud-native_network_functions:*:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_next_for_kubernetes:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:* |
|
Vendors & Products |
F5 big-ip Next Cloud-native Network Functions
F5 big-ip Next For Kubernetes |
Tue, 21 Oct 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5
F5 big-ip F5 big-ip Next F5 big-ip Next Service Proxy For Kubernetes F5 big Ip |
|
Vendors & Products |
F5
F5 big-ip F5 big-ip Next F5 big-ip Next Service Proxy For Kubernetes F5 big Ip |
Wed, 15 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 15 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When an iRule is configured on a virtual server via the declarative API, upon re-instantiation, the cleanup process can cause an increase in the Traffic Management Microkernel (TMM) memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
Title | TMM Vulnerability | |
Weaknesses | CWE-401 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: f5
Published: 2025-10-15T13:55:48.872Z
Updated: 2025-10-16T03:56:47.323Z
Reserved: 2025-10-03T23:04:21.132Z
Link: CVE-2025-54805

Updated: 2025-10-15T15:37:12.136Z

Status : Analyzed
Published: 2025-10-15T14:15:49.810
Modified: 2025-10-21T20:14:45.210
Link: CVE-2025-54805

No data.