CVE-2025-53521

Published Oct 15, 2025

Last updated 19 days ago

Exploit knownCVSS critical 9.3
BIG-IP APM
BIG-IP
OT
IoT
Supply chain

Overview

Description
When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Source
f5sirt@f5.com
NVD status
Analyzed
Products
big-ip_access_policy_manager

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.3
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

CVSS 3.1

Type
Secondary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
F5 BIG-IP Unspecified Vulnerability
Exploit added on
Mar 27, 2026
Exploit action due
Mar 30, 2026
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

f5sirt@f5.com
CWE-121

Social media

Hype score
Not currently trending
  1. F5 BIG-IP 긴급 패치, CVE-2025-53521 (출처 : 기록 | https://t.co/4mrWqpidcJ 블로그) https://t.co/nVerHLLeB7

    @J_zjaan7946

    17 Apr 2026

    157 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🔒 #CyberSecurity CVE-2025-53521: F5 BIG-IP Unauthenticated RCE — Detection and Emergency Hardeni… "On March 27, 2026, CISA added CVE-2025-53521 to its Known Exploited Vulnerabilities (KEV)…" 🔗 https://t.co/MhFNGwwQQi #CyberSecurity #ThreatIntel #vulnerability #cve

    @SecurityAr58409

    15 Apr 2026

    68 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 🔒 #CyberSecurity Immediate Action Required: Patching F5 BIG-IP APM Against CVE-2025-53521 "The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security…" 🔗 https://t.co/50qmp9rWtt #CyberSecurity #ThreatIntel #vulnerability #cve #patch

    @SecurityAr58409

    15 Apr 2026

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🔒 #CyberSecurity Urgent: Defending Against Active Exploitation of F5 BIG-IP APM (CVE-2025-53521) "The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm by…" 🔗 https://t.co/KdSlD7OTQ2 #CyberSecurity #ThreatIntel #vulnerability #cve #pat

    @SecurityAr58409

    15 Apr 2026

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. F5 has updated its security advisory for a vulnerability impacting BIG-IP APM that was originally disclosed in October 2025 (CVE-2025-53521). Learn more in our latest security bulletin: https://t.co/jmxqUJFEdG

    @ChannelSkell

    14 Apr 2026

    89 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. ثـ ـغرة CVE-2025-53521 في F5 BIG-IP APM تدخل قائمة CISA للثـ ـغرات المستغلة التفاصيل .. https://t.co/Q3M9WECM7s #مركز_الأمن_السيبراني_للابحاث_والدراسات https://t.co/UQ4lP3M55S

    @ccforrs

    10 Apr 2026

    118 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. CVE-2025-53521: 2025 vuln, 2026 RCE reclassification, active exploitation. 14K BIG-IP APM instances still on internet. F5 publishes IOCs and says "rebuild." When the vendor says rebuild, patching is theater. Your appliance is compromised. Question: why was it exposed?

    @CisoRaging77913

    10 Apr 2026

    119 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. F5 BIG-IP APM の RCE 脆弱性 CVE-2025-53521:実環境での積極的な悪用を確認 https://t.co/zwywf9Dtu3 この問題の原因は、脆弱性 CVE-2025-53521 に対する初期の分類が、サービス拒否 (DoS) とされていた点にあります。一般的に、

    @iototsecnews

    10 Apr 2026

    198 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. F5 has updated its security advisory regarding a vulnerability affecting BIG-IP APM that was originally disclosed in October 2025 (CVE-2025-53521). For more information, please see our latest security bulletin: https://t.co/ZJHoVjPYXs

    @rfrumm

    8 Apr 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. ⚠️ **Vulnerability Alert:** F5 BIG-IP Access Policy Manager Stack-based Buffer Overflow (CVE-2025-53521) — Actively Exploited RCE 📅 **Timeline:** Disclosure: 2025-04-08, Patch: 2025-04-08 🆔 **CVE-2025-53521** | 📊 CVSS: 9.8 (CRITICAL 🔴) | 📈 EPSS: 97.39% 🛠

    @syedaquib77

    8 Apr 2026

    123 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 統合版 JPCERT/CC | Weekly Report: F5 BIG-IP Access Policy Managerの脆弱性(CVE-2025-53521)に関する注意喚起 https://t.co/Qf7Ag9QiAK #itsec_jp

    @itsec_jp

    8 Apr 2026

    158 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. ⚠️ Stop scrolling if your company uses F5 BIG-IP APM Critical flaw CVE-2025-53521 is now on CISA’s KEV list—and already exploited. Attackers can run code remotely, steal data, and take over systems. Patch immediately. Don’t wait.

    @TheCyberse46292

    7 Apr 2026

    111 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🚨 Edge infrastructure is failing first — again. CISA just added two critical flaws to the KEV catalog: • Citrix NetScaler CVE-2026-3055 (memory overread via SAML IdP) • F5 BIG-IP APM CVE-2025-53521 (unauthenticated RCE) Both are actively exploited. New article → htt

    @ByteVanguardSec

    7 Apr 2026

    113 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. F5 hat seinen Sicherheitshinweis zu einer Sicherheitslücke aktualisiert, die BIG-IP APM betrifft und ursprünglich im Oktober 2025 bekannt gegeben wurde (CVE-2025-53521). Weitere Informationen finden Sie in unserem aktuellen Sicherheitsbulletin: https://t.co/ZBCqQ0TS2E

    @rfrumm

    7 Apr 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Attackers are actively exploiting CVE-2025-53521, a critical RCE in F5 BIG-IP APM, with Shadowserver identifying over 14,000 exposed instances globally after the flaw was reclassified from DoS to remote code execution and added to CISA’s KEV catalog. https://t.co/sNWUY2Y65O

    @VivekIntel

    6 Apr 2026

    165 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  16. CISA flags active F5 BIG-IP exploit. 🔗 https://t.co/SMp0zi7QPO CVE-2025-53521 enables unauthenticated remote code execution and full system compromise. KEV listing means urgent patching is required. #MADSecurity #CISA #Cybersecurity #VulnerabilityManagement

    @MADSecurityLLC

    6 Apr 2026

    119 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. ⚠️ Threat Update: F5 BIG-IP APM RCE Exploitation (CVE-2025-53521) 📝 Key Updates Summary: NEW: CVE-2025-53521 was reclassified in Mar 2026 from DoS to unauthenticated RCE and added to CISA's KEV (3/27/2026) with a federal remediation directive. NEW: Shadowserver snapshots

    @syedaquib77

    6 Apr 2026

    151 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. 【F5 BIG-IP APMの重大RCE、14,000超がなお露出】 F5 BIG-IP APMのRCE脆弱性 CVE-2025-53521 はすでに悪用が確認されており、なお14,000台超の公開インスタンスが残っていると報じられています。 未認証RCEにつながる深刻な

    @01ra66it

    6 Apr 2026

    276 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  19. ⚠️ Threat Update: Active Exploitation of CVE-2025-53521 Against F5 BIG-IP APM 📝 Key Updates Summary: NEW: 2026-04-06 incoming report corroborates active exploitation of CVE-2025-53521 and provides a Shadowserver exposure snapshot (~14,100 exposed APM fingerprints across

    @syedaquib77

    6 Apr 2026

    128 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. Attackers Exploit RCE Flaw as 14,000 F5 BIG-IP APM Instances Remain Exposed: Over 14,000 F5 BIG-IP APM instances remain exposed online, as attackers actively exploit a critical remote code execution flaw CVE-2025-53521. Over 14,000 F5 BIG-IP APM… https://t.co/zpLPylrt46 https:/

    @shah_sheikh

    6 Apr 2026

    113 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. [Security Affairs] Attackers Exploit RCE Flaw as 14,000 F5 BIG-IP APM Instances Remain Exposed. Over 14,000 F5 BIG-IP APM instances remain exposed online, as attackers actively exploit a critical remote code execution flaw CVE-2025-53521. Over 14,000... https://t.co/sqwmBHZnU3

    @shah_sheikh

    6 Apr 2026

    108 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. turns into an actively exploited F5 BIG-IP APM… (CVE-2025-53521) is a good reminder that this vulnerability can turn edge and identity infrastructure into a much bigger remote code execution problem. For defenders, the priority is to validate exposure, watch for suspic…

    @SocXAInvaders

    6 Apr 2026

    137 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. turns into an actively exploited F5 BIG-IP APM… (CVE-2025-53521) is a vulnerability story defenders should take serious… F5 has reclassified the vulnerability from a denial of service issue to remote code execution , confirmed exp…

    @fynn_JourX

    6 Apr 2026

    136 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. For defenders, cve-2025-53521 turns into an actively exploited f5 big-ip apm r… should move fast. F5 reclassified CVE-2025-53521 from DoS to remote code execution, CISA added it to KEV, and… 🔗 Details → https://t.co/ivyyW0SUmB

    @SocXAInvaders

    6 Apr 2026

    133 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Legacy exposure keeps paying off for attackers. CVE-2025-53521 turns into an actively exploited F5 BIG-IP… F5 reclassified CVE-2025-53521 from DoS to remote code execution, CISA added it to KEV, and… 🔗 Read → https://t.co/qAubleY76J

    @fynn_JourX

    6 Apr 2026

    132 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. turns into an actively exploited F5 BIG-IP APM… (CVE-2025-53521) deserves defender attention because this vulnerability… F5 has reclassified the vulnerability from a denial of service issue to remote code execution , confirmed exp…

    @lucasverdan

    6 Apr 2026

    159 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🛑 CVE-2025-53521 turns into an actively exploited F5 BIG-IP APM RCE F5 reclassified CVE-2025-53521 from DoS to remote code execution, CISA added it to KEV, and… 🔗 Details → https://t.co/TUf0xBbEnS

    @lucasverdan

    6 Apr 2026

    136 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. 🖋️ CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation 🖋️ The U.S. Cybersecurity and Infrastructure Security Agency CISA on Friday added a critical security flaw impacting F5 BIGIP Access Policy Manager APM to its Known Exploited Vulnerabilities KEV

    @zeeshankghouri

    5 Apr 2026

    216 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. Vulnerabilidad crítica CVE-2025-53521 en F5 BIG-IP APM fue añadida al catálogo CISA KEV,explotación activa. Permite Ejecución Remota de Código (RCE) sin autenticación,compromiso total del sistema. Se recomienda parcheo inmediato, revisión de logs y refuerzo de la monitori

    @nodoware_news

    4 Apr 2026

    189 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. 🚨 CVE-2025-53521: Critical F5 BIG-IP APM RCE exploited on 14k+ instances. Patch now! https://t.co/AC3AJMx7bQ

    @TheRabbitPy

    3 Apr 2026

    76 Impressions

    4 Retweets

    6 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  31. 🚨 Threat Alert: **F5 BIG-IP APM Unauthenticated RCE Exploitation (CVE-2025-53521)** 📅 Date: 2026-04-03 📆 Timeline: 2026-03-31: Shadowserver fingerprinted ~17,100 exposed BIG‑IP APM instances. 2026-04-03: Public reporting and vendor advisories; CISA added the flaw to

    @syedaquib77

    3 Apr 2026

    191 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. ⚠️ Threat Update: CVE-2025-53521 F5 BIG-IP APM RCE Exploitation 📝 Key Updates Summary: **UPDATE:** New 2026-04-03 reporting corroborates active exploitation of CVE-2025-53521 against internet-facing F5 BIG-IP APM appliances and adds a public reference plus an exposure sna

    @syedaquib77

    3 Apr 2026

    166 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. CVE-2025-53521 in F5 BIG-IP APM reclassified from DoS to critical RCE after active exploitation emerged. Over 14,000 systems still unpatched. CISA added to KEV catalog with Monday deadline for federal agencies. #Cybersecurity https://t.co/S8ABdzNzUC

    @battista212

    3 Apr 2026

    165 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  34. CVE-2025-53521, originally a DoS bug in F5 BIG-IP APM, now a critical RCE vulnerability actively exploited. Disclosed in Oct 2025, it poses significant risk. #cybersecurity #vulnerability

    @bigmacd16684

    3 Apr 2026

    147 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  35. 🚨 Threat Alert: 14,000+ Exposed F5 BIG-IP APM Instances Vulnerable to RCE 📅 Date: 2026-04-03 📆 Timeline: 2025-10-15: CVE-2025-53521 disclosed (initially classified as DoS). 2026-03 (late): F5 obtains new information and reclassifies flaw as RCE; F5 updates advisory

    @syedaquib77

    3 Apr 2026

    135 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. ⚠️ Threat Update: F5 BIG-IP APM RCE Exposure (CVE-2025-53521) 📝 Key Updates Summary: NEW: Multiple sources confirm active exploitation risk after the issue was reclassified from DoS to RCE (Mar–Apr 2026). NEW: Recent reporting (2026-04-03) quantifies ~17,100 Internet-ex

    @syedaquib77

    3 Apr 2026

    158 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. 🚨 Threat Alert: **14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability** 📅 Date: 2026-04-03 📆 Timeline: 2025-10-15: CVE-2025-53521 initially disclosed (classified as DoS). 2026-03-27: F5 updates advisory and CISA adds CVE-2025-53521 to

    @syedaquib77

    3 Apr 2026

    131 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. CISA KEV 警告 26/03/27:F5 BIG-IP の脆弱性 CVE-2025-53521 を登録 https://t.co/68Jxa8tKLP F5 BIG-IP システムの Access Policy Manager (APM) に発見された、きわめて深刻な脆弱性 CVE-2025-53521 が CISA KEV

    @iototsecnews

    3 Apr 2026

    169 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. TRC analysis shows attackers exploiting CVE-2025-53521 to gain unauthenticated RCE on F5 BIG-IP APM systems, then deploying web shells for persistent access. The compromised network appliances enable lateral movement to critical systems. Runtime segmentation helps contain

    @aviatrixtrc

    3 Apr 2026

    122 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. 🚨 [CRITICAL] Critical RCE Vulnerability in F5 BIG-IP Access Policy Manager Under Active Exploitation The UK NCSC has issued an urgent advisory regarding CVE-2025-53521, an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Policy Manager (APM). htt

    @HalluG76811

    2 Apr 2026

    81 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. CVE-2025-53521: F5 BIG-IP Access Policy Manager Remote Code Execution Vulnerability - What It Means for Your Business and How to Respond https://t.co/IwL5f8aPnr

    @integ_sec

    2 Apr 2026

    107 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. NEW THREAT INTEL: F5 BIG-IP APM RCE (CVE-2025-53521) - Chinese APT actively exploiting critical stack overflow. 9 detections, 16 IOCs. https://t.co/Q23BpYblFr #ThreatIntel #CyberSecurity #F5 #CISAKEV https://t.co/tgp3fE5Nzb

    @threadlinqs

    2 Apr 2026

    124 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. Over 14,000 F5 BIG-IP APM instances remain exposed online amid active exploitation of CVE-2025-53521, reclassified from DoS to remote code execution. F5 and CISA recommend system rebuilds and log checks. #CVE2025 #BIGIP #USA https://t.co/HCEF0kU3Hp

    @TweetThreatNews

    2 Apr 2026

    203 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  44. ⚠️ Threat Update: F5 BIG-IP APM exposure to CVE-2025-53521 (RCE) 📝 Key Updates Summary: NEW: Shadowserver telemetry identifies >14,000 Internet-exposed vulnerable BIG-IP APM instances and ~17,100 IPs with BIG-IP APM fingerprints. NEW: Evidence of active exploitation in

    @syedaquib77

    2 Apr 2026

    125 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. 🚨 Threat Alert: F5 BIG-IP APM exposure and RCE exploitation (CVE-2025-53521) 📅 Date: 2026-04-02 📆 Timeline: Oct 2025 — CVE disclosed (initially classified as DoS). Mar 2026 — New information led to reclassification to RCE; active exploitation observed. Mar 27, 2026

    @syedaquib77

    2 Apr 2026

    129 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. 🚨 Threat Alert: Over 14,000 F5 BIG‑IP APM instances still exposed to RCE attacks 📅 Date: 2026-04-02 (report); vulnerability first disclosed Oct 2025; active exploitation noted Mar–Apr 2026 📆 Timeline: 2025-10: CVE-2025-53521 initially disclosed as DoS. 2026-03: New

    @syedaquib77

    2 Apr 2026

    129 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. 🚨 BREAKING: Over 14,000 F5 BIG-IP APM instances exposed to active RCE attacks (CVE-2025-53521)! Hackers deploying webshells—patch NOW or risk full compromise. CISA KEV listed. #CyberSecurity #InfoSec #Hacking https://t.co/mLMazqupZv

    @Archange_Shadow

    2 Apr 2026

    114 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. ⚠️ **Vulnerability Alert:** F5 BIG-IP APM Unauthenticated Remote Code Execution (CVE-2025-53521) - Active Exploitation 📅 **Timeline:** Disclosure: unknown, Patch: unknown 🆔 **CVE-2025-53521** | 📊 CVSS: 9.8 (Critical 🔴) | 📈 EPSS: 97.38% 🛠️ **Exploit Matur

    @syedaquib77

    1 Apr 2026

    201 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. ⚠️ **Vulnerability Alert:** F5 BIG-IP APM unauthenticated Remote Code Execution (reclassified from DoS) - CVE-2025-53521 📅 **Timeline:** Disclosure: 2025-10-??, Patch: 2026-03-?? 🆔 **CVE-2025-53521** | 📊 CVSS: 9.8 (Critical 🔴) | 📈 EPSS: 97.38% 🛠️ **Explo

    @syedaquib77

    1 Apr 2026

    205 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. F5 BIG-IP APMの脆弱性がRCEに再分類-CVE-2025-53521は既に悪用確認 https://t.co/VrPyySkdKB #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews

    @securityLab_jp

    1 Apr 2026

    254 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations