F5 BIG-IP Flaw Escalated to Critical 9.8 RCE, Now Under Active Attack

F5 Reclassifies 5-Month-Old BIG-IP Vulnerability (CVE-2025-53521) to Critical RCE, CISA Confirms Active Exploitation

CRITICAL
April 1, 2026
5m read
VulnerabilityPatch ManagementCyberattack

Related Entities

Organizations

Products & Tech

BIG-IP Access Policy Manager (APM)

CVE Identifiers

CVE-2025-53521
CRITICAL
CVSS:9.8

Full Report

Executive Summary

F5 has issued a critical update regarding CVE-2025-53521, a vulnerability in its BIG-IP Access Policy Manager (APM). Initially disclosed in October 2025 as a medium-severity Denial of Service (DoS) issue, the flaw has been reclassified to a critical 9.8 CVSS unauthenticated Remote Code Execution (RCE) vulnerability. This dramatic escalation comes after F5 obtained new information in March 2026 revealing the flaw could be exploited for complete system takeover. The vulnerability is now being actively exploited in the wild, leading CISA to add it to its Known Exploited Vulnerabilities (KEV) catalog. An unauthenticated, remote attacker can gain root-level control of an affected BIG-IP system by sending malicious traffic. F5 has confirmed that patches released in October 2025 are effective against this RCE and is urging all customers to apply them immediately.


Vulnerability Details

  • CVE ID: CVE-2025-53521
  • CVSS Score: 9.8 (Critical)
  • Vulnerability Type: Unauthenticated Remote Code Execution (RCE)
  • Affected Component: BIG-IP Access Policy Manager (APM)
  • Impact: Full system compromise with root privileges.

The vulnerability allows a remote, unauthenticated attacker to execute arbitrary system commands by sending specially crafted traffic to a virtual server configured with an APM access policy. This means any internet-facing BIG-IP appliance using APM for access control is a potential target. The reclassification from DoS to RCE indicates that the initial analysis missed the full potential of the memory corruption or logic flaw, which attackers have now figured out how to leverage for code execution.

Affected Systems

Affected F5 BIG-IP versions include:

  • 17.5.0 - 17.5.1
  • 17.1.0 - 17.1.2
  • 16.1.0 - 16.1.6
  • 15.1.0 - 15.1.10

With over 240,000 F5 BIG-IP instances estimated to be internet-exposed, the attack surface is substantial. These devices are often used by large enterprises and critical infrastructure to manage and secure application traffic, making them high-value targets.

Exploitation Status

Both F5 and CISA have confirmed active exploitation of CVE-2025-53521. Attackers are actively scanning for and exploiting vulnerable systems. F5 has released indicators of compromise (IoCs) related to the attacks, which include the creation of malicious files and modifications to system binaries to establish persistence.

Known post-exploitation activity includes:

  • Modification of /usr/bin/umount
  • Modification of /usr/sbin/httpd
  • Creation of malicious files like c05d5254

This activity suggests attackers are installing web shells or other backdoors to maintain access after the initial exploit (T1505.003 - Web Shells).

Impact Assessment

A successful RCE exploit on a BIG-IP appliance is a worst-case scenario:

  • Complete System Takeover: Attackers gain root access, giving them full control of the device.
  • Traffic Interception/Modification: As a central traffic controller, a compromised BIG-IP can be used to decrypt, inspect, and modify all traffic passing through it, including sensitive user credentials and data.
  • Internal Network Access: BIG-IP appliances are trusted devices that bridge external and internal networks. A compromise provides a powerful pivot point for attackers to move laterally into the corporate network.
  • Persistent Foothold: Attackers can install persistent malware that survives reboots, making remediation difficult.

IOCs

Type Value Description
file_name c05d5254 Malicious file dropped post-exploitation.
file_path /usr/bin/umount System binary observed being modified by attackers.
file_path /usr/sbin/httpd System binary observed being modified by attackers.

Cyber Observables for Detection

Type Value Description Context Confidence
file_path /var/log/apm Monitor APM logs for anomalous entries or errors corresponding to the time of a suspected attack. Log analysis on the appliance, SIEM. medium
command_line_pattern tmsh Look for unexpected modifications to the BIG-IP configuration via the Traffic Management Shell (tmsh). Audit logs. high
file_name * Use file integrity monitoring to detect unauthorized changes to critical system files like /usr/bin/umount. FIM tools, endpoint scanning. high
network_traffic_pattern Outbound from TMM Monitor for any outbound connections from the Traffic Management Microkernel (TMM) process to unexpected external IPs. Firewall logs, NetFlow. high

Detection & Response

  1. Scan for Vulnerabilities: Immediately scan your environment to identify all BIG-IP appliances and their versions to determine if they are vulnerable.
  2. Hunt for IOCs: Use the provided IOCs to hunt for signs of compromise on your BIG-IP systems. Check for the existence of the malicious files and use file integrity checks (e.g., rpm -Vf /bin/umount) to verify system binaries.
  3. Analyze Logs: Review BIG-IP system logs (/var/log/ltm, /var/log/apm) and network traffic for any unusual activity originating from or directed at your BIG-IP appliances.
  4. Isolate and Rebuild: If a system is confirmed to be compromised, isolate it from the network and rebuild it from a known-good configuration. Simply patching a compromised system is not sufficient.

Mitigation

  1. Apply Patches: The patches released by F5 in October 2025 are effective against this RCE. Prioritize patching for all internet-facing BIG-IP appliances with APM enabled.
  2. Restrict Access: Limit access to the BIG-IP management interface to a secure, isolated management network. Do not expose the management interface to the internet.
  3. Web Application Firewall (WAF): While not a substitute for patching, a properly configured WAF in front of the BIG-IP may help block some malicious crafted requests, providing a layer of defense. This aligns with D3-ITF: Inbound Traffic Filtering.
  4. Regular Audits: Regularly audit BIG-IP configurations for any unauthorized changes.

Timeline of Events

1
October 1, 2025
F5 initially discloses CVE-2025-53521 as a medium-severity DoS vulnerability and releases patches.
2
March 28, 2026
F5 updates its advisory, reclassifying the vulnerability as a critical 9.8 CVSS RCE.
3
March 29, 2026
CISA adds CVE-2025-53521 to its Known Exploited Vulnerabilities (KEV) catalog.
4
April 1, 2026
This article was published

MITRE ATT&CK Mitigations

Applying the security updates provided by F5 is the most critical step to remediate this vulnerability.

Mapped D3FEND Techniques:

Ensure the BIG-IP management interface is not exposed to the internet and is only accessible from a secure, isolated network.

Audit

M1047enterprise

Implement file integrity monitoring and regular log reviews to detect unauthorized changes or signs of compromise on BIG-IP appliances.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CVE-2025-53521F5BIG-IPRCEVulnerabilityCISAKEVPatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats