CVE Vulnerabilities

CVE-2025-41399

Improper Resource Shutdown or Release

Published: May 07, 2025 | Modified: Oct 21, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

When a Stream Control Transmission Protocol (SCTP) profile is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

Name Vendor Start Version End Version
Big-ip_access_policy_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_advanced_firewall_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_advanced_web_application_firewall F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_analytics F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_application_acceleration_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_application_security_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_application_visibility_and_reporting F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_automation_toolchain F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_carrier-grade_nat F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_container_ingress_services F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_ddos_hybrid_defender F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_domain_name_system F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_edge_gateway F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_fraud_protection_service F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_global_traffic_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_link_controller F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_local_traffic_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_policy_enforcement_manager F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_ssl_orchestrator F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_webaccelerator F5 15.1.0 (including) 15.1.9 (excluding)
Big-ip_websafe F5 15.1.0 (including) 15.1.9 (excluding)

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References