AUTO-UPDATED

Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)

CISA has issued an urgent warning regarding active exploitation of a critical remote code execution vulnerability, CVE-2025-53521, affecting F5’s BIG-IP Access Policy Manager enterprise security software.

Key points

  • The vulnerability, CVE-2025-53521, carries a critical CVSS score of 9.8 and allows unauthenticated attackers to execute remote code on affected BIG-IP APM systems.
  • Affected versions include BIG-IP APM 15.1.x through 17.5.x, which are widely used by government agencies, financial institutions, and large enterprises.
  • Attackers linked to a nation-state actor have been observed deploying webshells and modifying system integrity checkers to maintain persistence within compromised networks.
  • F5 released patches in October 2025, but the vulnerability was only recently re-categorized as an RCE following new evidence discovered in March 2026.
  • CISA has mandated that all U.S. federal civilian agencies assess their systems for indicators of compromise and apply necessary mitigations by March 30, 2026.
Why it matters:

This vulnerability poses a severe risk to critical infrastructure and government networks that rely on F5 systems for secure access management. Because the flaw was initially misidentified as a denial-of-service issue, organizations that delayed patching may remain vulnerable to sophisticated, long-term unauthorized access.

Help Net Security Published by Zeljka Zorz
Read original