VulnerabilitiesCRITICAL

CVE-2025-53521 - F5 BIG-IP APM Vulnerability Reclassified

Featured image for CVE-2025-53521 - F5 BIG-IP APM Vulnerability Reclassified
AWArctic Wolf Blog
CVE-2025-53521F5 BIG-IPremote code executionsecurity advisoryunauthenticated access
🎯

Basically, a serious flaw in F5's system allows hackers to take control without needing a password.

Quick Summary

F5's BIG-IP APM vulnerability CVE-2025-53521 has been reclassified as a critical RCE. Unauthenticated attackers can exploit this flaw, putting many organizations at risk. Immediate action is required to upgrade affected systems.

The Flaw

On March 28, 2026, F5 Networks updated its security advisory for a vulnerability impacting its BIG-IP Access Policy Manager (APM). Initially disclosed in October 2025, this vulnerability, now identified as CVE-2025-53521, was originally classified as a medium-severity denial-of-service (DoS) issue. However, recent findings have led to its reclassification as a critical remote code execution (RCE) vulnerability. This means that attackers can exploit it to execute arbitrary code on affected systems without authentication.

The vulnerability arises from improper handling of crafted traffic within the APM component when an access policy is attached to a virtual server. This flaw enables unauthenticated remote threat actors to deploy malicious web shells, which can lead to severe exploitation scenarios.

What's at Risk

The most significant risk comes from internet-exposed APM virtual servers. These servers are particularly vulnerable because they are directly accessible from the internet, allowing attackers to exploit the vulnerability more easily. F5 has indicated that the original fixes released in October 2025 are expected to mitigate this newly documented RCE vector. However, the lack of a publicly available proof-of-concept (PoC) exploit does not diminish the urgency of addressing this vulnerability.

Due to the critical nature of this flaw, organizations using affected versions of BIG-IP APM should be particularly vigilant. The potential for widespread exploitation is high, given the extensive use of these devices in various enterprise environments.

Patch Status

F5 has released updates to address this vulnerability. Organizations using the affected versions of BIG-IP APM are strongly advised to upgrade to the latest fixed versions. Here are the details:

  • BIG-IP APM (15.1.x): Upgrade from versions 15.1.0–15.1.10 to 15.1.10.8
  • BIG-IP APM (16.1.x): Upgrade from versions 16.1.0–16.1.6 to 16.1.6.1
  • BIG-IP APM (17.1.x): Upgrade from versions 17.1.0–17.1.2 to 17.1.3
  • BIG-IP APM (17.5.x): Upgrade from versions 17.5.0–17.5.1 to 17.5.1.3

Organizations should follow their internal patching and testing guidelines to minimize any operational impact during this process.

Immediate Actions

To protect against potential exploitation, organizations must act quickly. Here are the recommended steps:

  • Upgrade to the latest fixed version of BIG-IP APM as soon as possible.
  • Monitor your network for any unusual activity that may indicate exploitation attempts.
  • Review access controls and ensure that only authorized personnel can access sensitive systems.
  • Educate staff about the risks associated with remote code execution vulnerabilities and the importance of timely updates.

By taking these proactive measures, organizations can significantly reduce their risk exposure and enhance their overall security posture against this critical vulnerability.

🔒 Pro insight: The reclassification of CVE-2025-53521 highlights the need for continuous monitoring of vulnerabilities, especially in widely used infrastructure components.

Original article from

AWArctic Wolf Blog· Arctic Wolf Labs
Read Full Article

Related Pings

CRITICALVulnerabilities

Telegram Zero-Click Vulnerability - Critical Device Threat

A critical zero-click vulnerability in Telegram could allow hackers to take over devices. Both individual users and businesses are at risk. Immediate action is needed to protect sensitive data.

SC Media·
HIGHVulnerabilities

Vim and Emacs RCE Vulnerabilities Found by Claude AI

Claude AI has uncovered serious RCE vulnerabilities in Vim and GNU Emacs. Users are at risk when opening crafted files. Immediate updates and caution are essential to stay safe.

BleepingComputer·
HIGHVulnerabilities

Citrix NetScaler ADC Bug - Added to CISA Exploit List

A critical vulnerability in Citrix NetScaler ADC has been added to CISA's exploit list. This bug poses significant risks, with thousands of appliances exposed online. Organizations must act quickly to patch and secure their systems.

SC Media·
CRITICALVulnerabilities

F5 BIG-IP DoS Bug - Critical RCE Under Active Exploitation

A critical vulnerability in F5 BIG-IP has been exploited in the wild. Organizations using affected versions must patch immediately to avoid severe consequences. Stay vigilant for signs of compromise.

CSO Online·
HIGHVulnerabilities

System Integrity - Essential Controls for Protection

New guidelines on system integrity controls are here! Organizations must act to protect their data from flaws and threats. These measures are essential for security and compliance.

Canadian Cyber Centre News·
HIGHVulnerabilities

ChatGPT Data Leakage - Vulnerability Discovered and Patched

A vulnerability in ChatGPT allowed sensitive data to be leaked through a DNS channel. OpenAI has patched this issue, but users must remain vigilant. The risk of data exposure could have serious compliance implications.

SC Media·