When the BIG-IP system is configured as both a Security Assertion Markup Language (SAML) service provider (SP) and Identity Provider (IdP), with single logout (SLO) enabled on an access policy, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 15 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 14:00:00 +0000

Type Values Removed Values Added
Description When the BIG-IP system is configured as both a Security Assertion Markup Language (SAML) service provider (SP) and Identity Provider (IdP), with single logout (SLO) enabled on an access policy, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title BIG-IP APM and SSL Orchestrator vulnerability
Weaknesses CWE-404
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2025-10-15T17:30:09.958Z

Reserved: 2025-10-03T23:04:03.858Z

Link: CVE-2025-47148

cve-icon Vulnrichment

Updated: 2025-10-15T15:45:53.484Z

cve-icon NVD

Status : Received

Published: 2025-10-15T14:15:47.637

Modified: 2025-10-15T14:15:47.637

Link: CVE-2025-47148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.