Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000148816 |
![]() ![]() |
Wed, 15 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 15 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When the BIG-IP system is configured as both a Security Assertion Markup Language (SAML) service provider (SP) and Identity Provider (IdP), with single logout (SLO) enabled on an access policy, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
Title | BIG-IP APM and SSL Orchestrator vulnerability | |
Weaknesses | CWE-404 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2025-10-15T17:30:09.958Z
Reserved: 2025-10-03T23:04:03.858Z
Link: CVE-2025-47148

Updated: 2025-10-15T15:45:53.484Z

Status : Received
Published: 2025-10-15T14:15:47.637
Modified: 2025-10-15T14:15:47.637
Link: CVE-2025-47148

No data.

No data.