When BIG-IP APM Access Profile is configured on a virtual server, undisclosed request can cause TMM to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
| Link | Resource |
|---|---|
| https://my.f5.com/manage/s/article/K000141003 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 14:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
F5
F5 big-ip Access Policy Manager |
|
| Summary |
|
|
| CPE | cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | |
| References | () https://my.f5.com/manage/s/article/K000141003 - Vendor Advisory |
05 Feb 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-05 18:15
Updated : 2025-11-12 14:36
NVD link : CVE-2025-23412
Mitre link : CVE-2025-23412
CVE.ORG link : CVE-2025-23412
JSON object : View
Products Affected
f5
- big-ip_access_policy_manager
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
