When the BIG-IP system is configured as both a Security Assertion Markup Language (SAML) service provider (SP) and Identity Provider (IdP), with single logout (SLO) enabled on an access policy, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://my.f5.com/manage/s/article/K000148816 |
![]() ![]() |
History
Wed, 15 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When the BIG-IP system is configured as both a Security Assertion Markup Language (SAML) service provider (SP) and Identity Provider (IdP), with single logout (SLO) enabled on an access policy, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
Title | BIG-IP APM and SSL Orchestrator vulnerability | |
Weaknesses | CWE-404 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: f5
Published:
Updated: 2025-10-15T17:30:09.958Z
Reserved: 2025-10-03T23:04:03.858Z
Link: CVE-2025-47148

No data.

Status : Received
Published: 2025-10-15T14:15:47.637
Modified: 2025-10-15T14:15:47.637
Link: CVE-2025-47148

No data.

No data.