CVE Vulnerabilities

CVE-2025-41399

Improper Resource Shutdown or Release

Published: May 07, 2025 | Modified: Oct 21, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

When a Stream Control Transmission Protocol (SCTP) profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
Big-ip_access_policy_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_advanced_firewall_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_advanced_web_application_firewallF515.1.0 (including)15.1.9 (excluding)
Big-ip_analyticsF515.1.0 (including)15.1.9 (excluding)
Big-ip_application_acceleration_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_application_security_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_application_visibility_and_reportingF515.1.0 (including)15.1.9 (excluding)
Big-ip_automation_toolchainF515.1.0 (including)15.1.9 (excluding)
Big-ip_carrier-grade_natF515.1.0 (including)15.1.9 (excluding)
Big-ip_container_ingress_servicesF515.1.0 (including)15.1.9 (excluding)
Big-ip_ddos_hybrid_defenderF515.1.0 (including)15.1.9 (excluding)
Big-ip_domain_name_systemF515.1.0 (including)15.1.9 (excluding)
Big-ip_edge_gatewayF515.1.0 (including)15.1.9 (excluding)
Big-ip_fraud_protection_serviceF515.1.0 (including)15.1.9 (excluding)
Big-ip_global_traffic_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_link_controllerF515.1.0 (including)15.1.9 (excluding)
Big-ip_local_traffic_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_policy_enforcement_managerF515.1.0 (including)15.1.9 (excluding)
Big-ip_ssl_orchestratorF515.1.0 (including)15.1.9 (excluding)
Big-ip_webacceleratorF515.1.0 (including)15.1.9 (excluding)
Big-ip_websafeF515.1.0 (including)15.1.9 (excluding)

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References