VulnerabilitiesCRITICAL

F5 BIG-IP DoS Flaw Upgraded to Critical RCE Exploit Alert

Featured image for F5 BIG-IP DoS Flaw Upgraded to Critical RCE Exploit Alert
SWSecurityWeek
CVE-2025-53521F5 BIG-IPRemote Code ExecutionCISAVulnerability
🎯

Basically, a serious flaw in F5 BIG-IP lets hackers run harmful code remotely.

Quick Summary

A critical vulnerability in F5 BIG-IP has been exploited in the wild. This flaw allows unauthenticated attackers to execute remote code. Organizations must patch vulnerable systems immediately.

The Flaw

A recently discovered vulnerability in F5 BIG-IP systems, tracked as CVE-2025-53521, has escalated from a high-severity denial-of-service (DoS) issue to a critical remote code execution (RCE) flaw. Initially disclosed in October 2025, this vulnerability has a CVSS score of 9.3, indicating its severity. The flaw primarily affects BIG-IP APM systems with specific access policies configured on virtual servers. It allows unauthenticated attackers to execute arbitrary code remotely, posing a significant risk to organizations using these systems.

F5 Networks has confirmed that the vulnerability is present in various versions of BIG-IP APM, including versions 17.5.0 to 17.5.1, 17.1.0 to 17.1.2, and earlier versions down to 15.1.0. The company has released patches in versions 17.5.1.3, 17.1.3, 16.1.6.1, and 15.1.10.8 to address this critical flaw. The rapid reclassification of this vulnerability underscores the urgency for organizations to act swiftly.

What's at Risk

Organizations using affected versions of BIG-IP APM are at high risk of exploitation. The vulnerability allows attackers to gain unauthorized access and execute malicious code, which can lead to severe consequences, including data breaches and system compromises. F5 has indicated that the flaw is a data plane issue, meaning it affects how data is processed, but does not expose the control plane. However, the potential for damage remains significant.

The CISA (Cybersecurity and Infrastructure Security Agency) has added CVE-2025-53521 to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to patch the vulnerability within three days. This highlights the critical nature of the flaw and the need for immediate action from all organizations using the affected systems.

Patch Status

F5 has confirmed that the original remediation for this vulnerability has been validated to effectively address the RCE issue in the fixed versions. Organizations should prioritize applying these patches to mitigate the risk of exploitation. The presence of indicators of compromise (IOCs) associated with the vulnerability, such as rogue files and mismatched file hashes, further emphasizes the need for vigilance.

F5 has provided guidance on identifying potential compromises, including checking for specific log entries and unusual outbound traffic patterns that may indicate successful exploitation. Organizations must stay proactive in monitoring their systems and applying the necessary updates.

Immediate Actions

To protect against the exploitation of CVE-2025-53521, organizations should take the following steps:

  • Update all affected BIG-IP APM systems to the latest patched versions.
  • Monitor for indicators of compromise, including rogue files and abnormal traffic patterns.
  • Educate staff on the importance of cybersecurity hygiene to prevent unauthorized access.

By acting swiftly and implementing these measures, organizations can significantly reduce their risk of falling victim to this critical vulnerability. The cybersecurity landscape is constantly evolving, and staying informed and prepared is essential for safeguarding sensitive data and systems.

🔒 Pro insight: The rapid escalation of CVE-2025-53521 highlights the need for organizations to maintain a proactive patch management strategy.

Original article from

SWSecurityWeek· Ionut Arghire
Read Full Article

Related Pings

MEDIUMVulnerabilities

Windows Update - Microsoft Pulls KB5079391 Over Errors

Microsoft has paused the KB5079391 update due to installation errors affecting Windows 11. Users are facing error code 0x80073712. A fix is anticipated soon, but users should remain cautious.

BleepingComputer·
CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical Flaw Actively Exploited

A critical SQL injection vulnerability in Fortinet's FortiClient EMS is actively being exploited, allowing attackers to execute arbitrary code on vulnerable systems.

BleepingComputer·
HIGHVulnerabilities

Microsoft Issues Critical Updates for Windows Secure Boot

Microsoft has issued critical updates for Windows 11 to address Secure Boot certificate expiration. System administrators must act quickly to prevent boot failures. These updates enhance Windows Recovery and Setup functionalities, ensuring devices remain operational and secure.

Cyber Security News·
MEDIUMVulnerabilities

File Read Flaw - Vulnerability in Smart Slider Plugin

A vulnerability in the Smart Slider 3 plugin threatens over 500,000 WordPress sites, allowing unauthorized file access. Site owners must update their plugins immediately to mitigate risks.

BleepingComputer·
HIGHVulnerabilities

Safari 26.4 - Critical Vulnerabilities Addressed

Apple has released Safari 26.4 to fix serious vulnerabilities in WebKit. This update is crucial for macOS users to protect against potential exploits. Make sure to update your software for enhanced security.

Full Disclosure·
HIGHVulnerabilities

Xcode 26.4 - Critical Security Update Released

Apple has rolled out Xcode 26.4 to fix serious vulnerabilities in macOS Tahoe. Developers should update immediately to prevent system crashes and unauthorized file access. Stay secure and keep your tools up to date!

Full Disclosure·