CVE-2025-53521

F5 BIG-IP APM — Remote Code Execution via Malicious Traffic to Access Policy Virtual Server
🔥 CVSS 3.1  9.8 / 10 — CRITICAL 🔴 CISA Known Exploited Vulnerability

Overview

Actively Exploited. CVE-2025-53521 is a remote code execution (RCE) vulnerability in F5 BIG-IP Access Policy Manager (APM). When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to unauthenticated remote code execution. This is a data plane issue — no control plane exposure. BIG-IP systems in Appliance mode are also vulnerable.

Recategorization to Critical RCE

This CVE was originally published on October 15, 2025 and categorized as a Denial-of-Service (DoS) vulnerability with CVSS scores of 7.5 (v3.1) and 8.7 (v4.0). In March 2026, based on new information, F5 re-categorized it as RCE — elevating it to CVSS 9.8 (v3.1) / 9.3 (v4.0) — CRITICAL. F5 simultaneously published an Indicators of Compromise article (K000160486), confirming in-the-wild exploitation.

Key implications of the recategorization:

  • Initially underestimated: Publicly known since October 2025 as a lower-priority DoS issue. The March 2026 upgrade to RCE indicates attackers discovered the full exploitation potential — likely through active exploitation.
  • 5+ months of exposure: Organizations that treated this as a DoS fix may have remained unpatched for months.
  • Historical pattern: This follows a pattern seen with other network appliance vulnerabilities where initial DoS classifications are later found to be exploitable for full RCE — similar to past Citrix, Fortinet, and Ivanti disclosures.

Vulnerability Description

When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution. The root cause is CWE-770: Allocation of Resources Without Limits or Throttling. The vulnerable apmd process fails to properly limit resource allocation when processing specific crafted traffic directed at a virtual server with an APM access policy configured. An unauthenticated remote attacker can send malicious traffic to the data plane to trigger this flaw, achieving arbitrary code execution.

Pre-condition: The BIG-IP system must have an APM access policy configured on a virtual server to be vulnerable. Systems without APM access policies are not affected. Systems initially installed with a fixed BIG-IP version are not vulnerable.

Affected Products

Only F5 BIG-IP Access Policy Manager (APM) is affected. BIG-IQ, BIG-IP Next, F5OS, NGINX, F5 Distributed Cloud, and Traffix SDC are not vulnerable.

Branch Vulnerable Versions Fixed Version
BIG-IP APM 17.5.x 17.5.0 – 17.5.1 17.5.1.3
BIG-IP APM 17.1.x 17.1.0 – 17.1.2 17.1.3
BIG-IP APM 16.1.x 16.1.0 – 16.1.6 16.1.6.1
BIG-IP APM 15.1.x 15.1.0 – 15.1.10 15.1.10.8

Impact

BIG-IP APM appliances serve as VPN gateways, application access controllers, and authentication proxies for enterprise networks. Compromising a BIG-IP system can give attackers a foothold into the entire internal network, access to authentication credentials, and the ability to intercept or modify traffic for all applications behind the device.

Indicators of Compromise

F5 published IOC article K000160486 for all systems that were upgraded from a vulnerable version or are currently running a vulnerable version. Systems installed from scratch with a fixed BIG-IP version are not vulnerable and do not need IOC review.

If compromise is suspected, refer to K11438344 for incident response guidance. F5 strongly recommends rebuilding the configuration from scratch rather than restoring from UCS backups — backups from compromised systems can contain persistent malware.

Remediation

  1. Upgrade immediately to one of the patched firmware versions listed above.
  2. Review Indicators of Compromise — check K000160486 for all systems that were upgraded from or are running vulnerable versions.
  3. No vendor-provided mitigation exists — patching is the only remediation.
  4. If compromise is suspected: rebuild the configuration from scratch rather than restoring from UCS backups.

Acknowledgments: F5 credited Kristian Vlaardingerbroek, Hugo Trippaers, and other members of Schuberg Philis; Bart Vrancken; Fox-IT; and the National Cyber Security Centre (NCSC) Netherlands for their assistance and coordinated disclosure.

Key Details

PropertyValue
CVE ID CVE-2025-53521
Vendor / Product F5 — BIG-IP APM
NVD Published2025-10-15
NVD Last Modified2026-03-27
CNAF5 Networks
CVSS 3.1 Score9.8
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityCRITICAL
CWE CWE-770
CISA KEV Added2026-03-27
CISA KEV Deadline2026-03-30
Known Ransomware Use No
Affected VersionsBIG-IP APM 15.1.x – 17.5.x (see details)

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2026-03-30. Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2025-10-15CVE published on NVD; F5 Advisory K000156741 released — categorized as DoS, CVSS 7.5 (v3.1)
2026-03-27F5 re-categorizes vulnerability as RCE (CVSS 9.8 v3.1 / 9.3 v4.0); added to CISA KEV catalog
2026-03-28F5 publishes IOC article K000160486 and updates advisory K000156741
2026-03-30CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2025-53521 Vulnerability Database
F5 Security Advisory K000156741 Vendor Advisory
F5 Indicators of Compromise — K000160486 Indicators of Compromise
F5 Compromise Response Guidance — K11438344 Incident Response
CISA KEV Catalog Entry US Government