Traffic Management Issue in BIG-IP APM Access Policy by F5 Networks
CVE-2025-53521
Key Information:
Badges
What is CVE-2025-53521?
CVE-2025-53521 is a critical vulnerability found in the BIG-IP Access Policy Manager (APM) of F5 Networks. This vulnerability arises when a BIG-IP APM access policy is set up on a virtual server. It allows malicious traffic to exploit weaknesses in the configuration, leading to Remote Code Execution (RCE). Such exploitation enables attackers to run arbitrary code on affected systems, posing severe risks to organizations that rely on this application for secure access management. Given that BIG-IP APM is widely utilized in environments that manage sensitive data and handle user authentication, the realization of this vulnerability could lead to unauthorized control, significant data exposure, and disruption of critical services.
Potential impact of CVE-2025-53521
-
Remote Code Execution: The most immediate and serious threat posed by this vulnerability is RCE. This allows attackers to gain unauthorized control over systems, making it possible for them to manipulate data, install malware, or disrupt operations.
-
Data Breaches: Exploitation can lead to significant data exposure, including sensitive user credentials and corporate data. Such breaches not only compromise individual privacy but also can lead to regulatory penalties and damage to an organization's reputation.
-
Service Disruption: Organizations relying on BIG-IP APM for secure access may experience service interruption. Exploitation may lead to downtime, impacting operations and user access, resulting in financial losses and reduced trust from customers and stakeholders.
CISA has reported CVE-2025-53521
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2025-53521 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
BIG-IP 17.5.0 < 17.5.1.3
BIG-IP 17.1.0 < 17.1.3
BIG-IP 16.1.0 < 16.1.6.1
News Articles
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability.
1 week ago
Fortinet BIG-IP Vuln Reclassified as RCE, Under Exploitation
CVE-2025-53521 was first disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information reveals the bug is much more dangerous.
2 weeks ago
F5 BIG-IP Vuln Reclassified as RCE, Under Exploitation
CVE-2025-53521 was first disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information reveals the bug is much more dangerous.
2 weeks ago
References
EPSS Score
41% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- π
Vulnerability started trending
- πΎ
Exploit known to exist
- π°
First article discovered by The Hacker News
- π¦
CISA Reported
Vulnerability published
Vulnerability Reserved