CISA Confirms Active Exploitation of F5 BIG-IP APM Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency added CVE-2025-53521 to its Known Exploited Vulnerabilities catalog on March 28, 2026, after confirming evidence of active exploitation targeting F5 BIG-IP Access Policy Manager systems. The vulnerability carries a critical CVSS v4 score of 9.3, indicating severe risk to affected organizations.
CVE-2025-53521 represents a remote code execution flaw that allows attackers to execute arbitrary commands on vulnerable F5 BIG-IP APM systems without authentication. The vulnerability stems from improper input validation in the Access Policy Manager component, which handles authentication and authorization for network access control. When exploited, attackers can bypass security controls and gain complete system access.
F5 BIG-IP Access Policy Manager serves as a critical network security component for thousands of organizations worldwide, providing secure remote access, VPN services, and identity-based access control. The system typically sits at network perimeters, making successful exploitation particularly dangerous as it can provide attackers with a foothold into internal networks. Organizations using BIG-IP APM for remote worker access or partner connectivity face elevated risk from this vulnerability.
The National Vulnerability Database confirms the technical details of this remote code execution flaw, which affects multiple versions of the BIG-IP software stack. CISA's decision to add this vulnerability to the KEV catalog indicates that federal agencies have observed active exploitation attempts in the wild, triggering mandatory patching requirements for government systems.
Related: Quest KACE CVE-2025-32975 Exploited in Education Attacks
Related: Veeam Patches Four Critical RCE Flaws in Backup Software
Related: CISA Warns of Actively Exploited Wing FTP Server Flaw
Related: Oracle Patches Critical RCE Flaw in Identity Manager
Security researchers first identified this vulnerability during routine security assessments of F5's BIG-IP platform. The flaw allows remote attackers to send specially crafted requests to the APM interface, bypassing authentication mechanisms and executing system-level commands. This attack vector doesn't require prior access to the target system, making it particularly attractive to threat actors seeking initial network compromise.
F5 BIG-IP APM Deployments Face Critical Exposure Risk
Organizations running F5 BIG-IP Access Policy Manager versions 17.1.0 through 17.1.1, 16.1.0 through 16.1.4, and 15.1.0 through 15.1.10 are vulnerable to CVE-2025-53521 exploitation. The vulnerability affects both physical and virtual BIG-IP appliances deployed in on-premises, cloud, and hybrid environments. Systems configured with APM modules enabled face the highest risk, particularly those exposed to internet-facing connections.
Enterprise organizations using BIG-IP APM for remote access solutions, including VPN gateways, secure web gateways, and identity federation services, must prioritize immediate patching. Financial services, healthcare, government agencies, and critical infrastructure operators represent primary targets due to their valuable data assets and network access patterns. The vulnerability's remote exploitation capability means attackers can target these systems from anywhere on the internet without requiring insider access or social engineering tactics.
Federal agencies face mandatory patching deadlines under CISA's Binding Operational Directive 22-01, which requires government systems to address KEV catalog vulnerabilities within specified timeframes. Private sector organizations, while not legally bound by these directives, should treat KEV additions as high-priority security incidents requiring immediate attention. The combination of critical CVSS scoring and confirmed active exploitation creates a perfect storm for widespread compromise if left unaddressed.
Immediate Patching and Mitigation Steps for CVE-2025-53521
F5 Networks released security patches addressing CVE-2025-53521 in BIG-IP software versions 17.1.2, 16.1.5, and 15.1.11. Organizations must download and install these updates immediately from F5's official support portal. The patching process requires system maintenance windows due to potential service interruptions, but the critical nature of this vulnerability justifies emergency change procedures.
Before applying patches, administrators should verify their current BIG-IP software versions using the command 'tmsh show sys version' from the system console. Systems running vulnerable versions must be updated using F5's standard upgrade procedures, which include configuration backups, health checks, and rollback planning. Organizations with high-availability BIG-IP pairs can perform rolling updates to minimize service disruption while maintaining security posture.
As temporary mitigation while patches are being deployed, organizations can implement access control lists to restrict APM interface access to authorized management networks only. Disabling unnecessary APM services and implementing additional network segmentation can reduce attack surface exposure. However, these workarounds provide limited protection compared to applying official security patches, and organizations should not rely on them as permanent solutions.
The MITRE CVE database provides additional technical details for security teams developing detection rules and incident response procedures. Organizations should monitor their BIG-IP systems for unusual authentication patterns, unexpected system processes, and network connections that might indicate successful exploitation attempts. Implementing comprehensive logging and security monitoring helps detect both successful and attempted exploitation of this vulnerability.




