ANAVEM
Languagefr
Server rack with red emergency lighting and unplugged network cable

CISA Adds Critical F5 BIG-IP CVE-2025-53521 to KEV Catalog

CISA added CVE-2025-53521 affecting F5 BIG-IP Access Policy Manager to its Known Exploited Vulnerabilities catalog following confirmed active exploitation.

Evan MaelEvan Mael
28 March 2026, 08:07 5 min read

Last updated 28 March 2026, 10:00

SEVERITYCritical 9.3/10
CVE IDCVE-2025-53521
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORF5 Networks
AFFECTEDBIG-IP Access Policy Manager v...
CATEGORYVulnerabilities

Key Takeaways

CISA Confirms Active Exploitation of F5 BIG-IP APM Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency added CVE-2025-53521 to its Known Exploited Vulnerabilities catalog on March 28, 2026, after confirming evidence of active exploitation targeting F5 BIG-IP Access Policy Manager systems. The vulnerability carries a critical CVSS v4 score of 9.3, indicating severe risk to affected organizations.

CVE-2025-53521 represents a remote code execution flaw that allows attackers to execute arbitrary commands on vulnerable F5 BIG-IP APM systems without authentication. The vulnerability stems from improper input validation in the Access Policy Manager component, which handles authentication and authorization for network access control. When exploited, attackers can bypass security controls and gain complete system access.

F5 BIG-IP Access Policy Manager serves as a critical network security component for thousands of organizations worldwide, providing secure remote access, VPN services, and identity-based access control. The system typically sits at network perimeters, making successful exploitation particularly dangerous as it can provide attackers with a foothold into internal networks. Organizations using BIG-IP APM for remote worker access or partner connectivity face elevated risk from this vulnerability.

The National Vulnerability Database confirms the technical details of this remote code execution flaw, which affects multiple versions of the BIG-IP software stack. CISA's decision to add this vulnerability to the KEV catalog indicates that federal agencies have observed active exploitation attempts in the wild, triggering mandatory patching requirements for government systems.

Related: Quest KACE CVE-2025-32975 Exploited in Education Attacks

Related: Veeam Patches Four Critical RCE Flaws in Backup Software

Related: CISA Warns of Actively Exploited Wing FTP Server Flaw

Related: Oracle Patches Critical RCE Flaw in Identity Manager

Security researchers first identified this vulnerability during routine security assessments of F5's BIG-IP platform. The flaw allows remote attackers to send specially crafted requests to the APM interface, bypassing authentication mechanisms and executing system-level commands. This attack vector doesn't require prior access to the target system, making it particularly attractive to threat actors seeking initial network compromise.

F5 BIG-IP APM Deployments Face Critical Exposure Risk

Organizations running F5 BIG-IP Access Policy Manager versions 17.1.0 through 17.1.1, 16.1.0 through 16.1.4, and 15.1.0 through 15.1.10 are vulnerable to CVE-2025-53521 exploitation. The vulnerability affects both physical and virtual BIG-IP appliances deployed in on-premises, cloud, and hybrid environments. Systems configured with APM modules enabled face the highest risk, particularly those exposed to internet-facing connections.

Enterprise organizations using BIG-IP APM for remote access solutions, including VPN gateways, secure web gateways, and identity federation services, must prioritize immediate patching. Financial services, healthcare, government agencies, and critical infrastructure operators represent primary targets due to their valuable data assets and network access patterns. The vulnerability's remote exploitation capability means attackers can target these systems from anywhere on the internet without requiring insider access or social engineering tactics.

Federal agencies face mandatory patching deadlines under CISA's Binding Operational Directive 22-01, which requires government systems to address KEV catalog vulnerabilities within specified timeframes. Private sector organizations, while not legally bound by these directives, should treat KEV additions as high-priority security incidents requiring immediate attention. The combination of critical CVSS scoring and confirmed active exploitation creates a perfect storm for widespread compromise if left unaddressed.

Immediate Patching and Mitigation Steps for CVE-2025-53521

F5 Networks released security patches addressing CVE-2025-53521 in BIG-IP software versions 17.1.2, 16.1.5, and 15.1.11. Organizations must download and install these updates immediately from F5's official support portal. The patching process requires system maintenance windows due to potential service interruptions, but the critical nature of this vulnerability justifies emergency change procedures.

Before applying patches, administrators should verify their current BIG-IP software versions using the command 'tmsh show sys version' from the system console. Systems running vulnerable versions must be updated using F5's standard upgrade procedures, which include configuration backups, health checks, and rollback planning. Organizations with high-availability BIG-IP pairs can perform rolling updates to minimize service disruption while maintaining security posture.

As temporary mitigation while patches are being deployed, organizations can implement access control lists to restrict APM interface access to authorized management networks only. Disabling unnecessary APM services and implementing additional network segmentation can reduce attack surface exposure. However, these workarounds provide limited protection compared to applying official security patches, and organizations should not rely on them as permanent solutions.

The MITRE CVE database provides additional technical details for security teams developing detection rules and incident response procedures. Organizations should monitor their BIG-IP systems for unusual authentication patterns, unexpected system processes, and network connections that might indicate successful exploitation attempts. Implementing comprehensive logging and security monitoring helps detect both successful and attempted exploitation of this vulnerability.

Frequently Asked Questions

How do I check if my F5 BIG-IP system is vulnerable to CVE-2025-53521?+
Run the command 'tmsh show sys version' from your BIG-IP console to check your software version. Versions 17.1.0-17.1.1, 16.1.0-16.1.4, and 15.1.0-15.1.10 are vulnerable and require immediate patching.
What makes CVE-2025-53521 so dangerous for organizations?+
This vulnerability allows remote attackers to execute code without authentication on F5 BIG-IP APM systems. Since these systems often sit at network perimeters handling remote access, successful exploitation can provide attackers with a gateway into internal networks.
Which F5 BIG-IP software versions fix CVE-2025-53521?+
F5 Networks released patches in versions 17.1.2, 16.1.5, and 15.1.11. Organizations should upgrade to these versions immediately to address the remote code execution vulnerability.
Evan Mael
About the Author

Evan Mael

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

Sign in to join the discussion