
Photo by Ordercrazy (Wikimedia Commons, CC0) on Wikimedia Commons
What happened
CISA updated its Known Exploited Vulnerabilities (KEV) catalog (version 2026.03.27) and added CVE-2025-53521 affecting F5 BIG-IP.
CISA’s entry describes this as an F5 BIG-IP vulnerability that can allow remote code execution and marks it as actively exploited. NVD also tracks the issue as affecting BIG-IP deployments where APM access policy handling can be abused by malicious traffic.
Why this matters
BIG-IP often sits at critical network choke points (VPN, access proxy, app delivery, WAF/edge functions). A KEV-listed flaw in this layer is high-priority because compromise can expose authentication paths and internal applications, not just a single host.
If internet-facing BIG-IP APM instances are exposed and unpatched, this is a practical intrusion path for initial access.
How to check if you’re affected
Potentially affected environments
- Organizations running F5 BIG-IP with APM-enabled virtual servers.
- Internet-exposed BIG-IP instances handling remote user/application access.
- Environments still on versions that predate vendor remediations for CVE-2025-53521.
Concrete verification steps (15–30 minute triage)
Inventory BIG-IP versions and modules now
- List all BIG-IP instances and identify where APM is enabled.
- Compare running versions against F5 remediation guidance for CVE-2025-53521.
Map internet exposure
- Confirm which BIG-IP virtual servers are reachable from the public internet.
- Prioritize externally reachable APM entry points first.
Review health and security telemetry
- Check BIG-IP/TMM crash/restart events and unusual request patterns hitting APM policies.
- Investigate any unexplained service instability around access-policy traffic.
Patch and harden
- Apply vendor fixes/mitigations on an emergency timeline.
- Restrict access paths where possible (allowlists, segmentation, minimal exposure).
Assume breach if suspicious signals exist
- Rotate credentials/tokens that may have traversed compromised edge services.
- Hunt for downstream lateral movement from BIG-IP-adjacent network zones.
Immediate defensive actions
- Treat CVE-2025-53521 as KEV-priority and patch urgently.
- Minimize public attack surface for BIG-IP/APM entry points until fully remediated.
- Run compromise checks on internet-exposed F5 infrastructure before declaring closure.
Sources
- https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53521
- https://nvd.nist.gov/vuln/detail/CVE-2025-53521
- https://my.f5.com/manage/s/article/K000156741
Bottom line
A newly added KEV entry for a perimeter product should trigger immediate action. If you run F5 BIG-IP with APM in exposed paths, validate version status and remediation now—this is not a backlog item.
