[CIVN-2025-0270] Multiple vulnerabilities in F5 products

By Published On: October 17, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple vulnerabilities in F5 products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
BIG-IP (all modules) versions 17.5.0 – 17.5.1, 17.1.0 – 17.1.2, 16.1.0 – 16.1.6 and 15.1.0 – 15.1.10
F5OS-A versions 1.8.1- 1.8.2 and 1.5.1 – 1.5.3
F5OS-C versions 1.8.0 – 1.8.1 and 1.6.0 – 1.6.3
BIG-IP Next SPK versions 1.7.0 – 1.9.2, 2.0.0 – 2.0.2
BIG-IP Next CNF versions 1.1.0 – 1.4.1, 2.0.0 – 2.1.0
BIG-IP SSL Orchestrator versions 17.5.0, 17.1.0 – 17.1.2, 16.1.0 – 16.1.5, 15.1.0 – 15.1.10
BIG-IP ASM versions 17.1.0 – 17.1.2, 16.1.0 – 16.1.5
BIG-IP PEM versions 17.5.0, 17.1.0 – 17.1.2, 16.1.0 – 16.1.6, 15.1.0 – 15.1.10
BIG-IP Next for Kubernetes versions 2.0.0 – 2.1.0
BIG-IP AFM versions 17.5.0, 17.1.0 – 17.1.2 and 15.1.0 – 15.1.10
BIG-IP Advanced WAF/ASM versions 17.5.0 – 17.5.1, 17.1.0 – 17.1.2, 16.1.0 – 16.1.6, 15.1.0 – 15.1.10
BIG-IP APM, APM with SWG, SSL Orchestrator, SSL Orchestrator with SWG versions 17.5.0 – 17.5.1, 17.1.0 – 17.1.2, 16.1.0 – 16.1.6, 15.1.0 – 15.1.10
NGINX App Protect WAF versions 4.5.0 – 4.6.0
Overview
Multiple vulnerabilities have been reported in F5 products which could allow the attacker to perform cross-site scripting (XSS), information disclosure, privilege elevation, data manipulation and cause denial of service attacks on targeted system.
Target Audience: 
All organizations and individuals using the affected F5 products.
Risk Assessment:
High risks of privilege elevation, Information disclosure and data manipulation.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
Multiple vulnerabilities exist in F5 products. An authenticated attacker could exploit these vulnerabilities by accessing source code and configuration details of the targeted device.
Successful exploitation of these vulnerabilities could allow the attacker to perform cross-site scripting (XSS), information disclosure, privilege elevation, data manipulation and cause denial of service attacks on an affected system.
Solution
Apply appropriate updates as mentioned in:
https://my.f5.com/manage/s/article/K000156572
Vendor Information
F5
https://my.f5.com/manage/s/article/K000156572
References
F5
https://my.f5.com/manage/s/article/K000156572
CVE Name
CVE-2025-53868
CVE-2025-61955
CVE-2025-57780
CVE-2025-60016
CVE-2025-59781
CVE-2025-61951
CVE-2025-53856
CVE-2025-61974
CVE-2025-58071
CVE-2025-53521
CVE-2025-61960
CVE-2025-54854
CVE-2025-53474
CVE-2025-61900
CVE-2025-59778
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=YesW
—–END PGP SIGNATURE—–

Share this article