{"vulnerability": "CVE-2025-22891", "sightings": [{"uuid": "3092c5f1-e824-4cb4-aa82-d9ea138d823b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22891", "type": "seen", "source": "https://t.me/cvedetector/17327", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22891 - F5 BIG-IP Diameter Endpoint Profile Denial of Service (DoS) and Memory Consumption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22891 \nPublished : Feb. 5, 2025, 6:15 p.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T21:40:00.000000Z"}, {"uuid": "7a9e728d-bd98-4800-bc80-69b200038955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22891", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952551540292342", "content": "", "creation_timestamp": "2025-02-05T17:52:27.631083Z"}, {"uuid": "59fa4132-e7d6-4b32-8db7-c41e10513078", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22891", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh6kh7tzg2t", "content": "", "creation_timestamp": "2025-02-05T18:16:46.428696Z"}]}