F5 BIG-IP APM Flaw Upgraded to Active RCE Risk, Urgency to Patch

TL;DR Summary
F5 Networks reclassified the BIG-IP APM vulnerability CVE-2025-53521 from a DoS issue to a critical remote code execution flaw, with attackers exploiting unpatched systems to deploy webshells. CISA has ordered federal agencies to patch, and F5 issued mitigations and indicators of compromise as online exposure of BIG-IP instances remains high. Patch now and review disks, logs, and terminal history for signs of intrusion.
- Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now BleepingComputer
- CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation The Hacker News
- Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521) Help Net Security
- Critical BIG-IP bug exploited: Pre-auth RCE and bad news thestack.technology
- Vulnerability affecting F5 BIG-IP APM National Cyber Security Centre
Reading Insights
Total Reads
0
Unique Readers
5
Time Saved
3 min
vs 4 min read
Condensed
92%
746 → 63 words
Want the full story? Read the original article
Read on BleepingComputer