Introduction
On March 27, 2026, CISA added CVE-2025-53521 to its Known Exploited Vulnerabilities (KEV) Catalog, confirming active exploitation of a critical security flaw in F5 BIG-IP systems. This vulnerability allows unauthenticated remote code execution (RCE), providing malicious actors with a direct pathway to compromise network infrastructure. Given the privileged position of BIG-IP devices in data centers—often sitting at the perimeter and handling decrypted traffic—this is not a standard application bug; it is a potentially catastrophic network breach.
Federal Civilian Executive Branch (FCEB) agencies are required to remediate this vulnerability by the deadline set in Binding Operational Directive (BOD) 22-01. However, the risk extends far beyond the federal government. Any organization utilizing BIG-IP ADW, APM, ASM, or LTM modules is currently in the crosshairs.
Technical Analysis
Affected Products: F5 BIG-IP (all physical, virtual, and VIPRION editions).
CVE Identifier: CVE-2025-53521
CVSS Score: 9.8 (Critical)
Vulnerability Mechanics:
The vulnerability resides in the traffic management interface (specifically the REST API or TMUI components, depending on the specific undisclosed vector). It allows an attacker to send a specially crafted HTTP request to the management interface (self-IPs or port 443). Because the device trusts this input implicitly, the request bypasses authentication checks and executes arbitrary commands with root privileges on the underlying Linux-based operating system (TMOS).
Exploitation Status: CISA has confirmed evidence of active exploitation. Attackers are leveraging this vulnerability to gain initial access, drop webshells, and move laterally into internal networks. The attack chain is typically:
- Reconnaissance: Scanning for open BIG-IP management ports (443/8443).
- Exploitation: Sending unauthenticated malicious HTTP payloads.
- Execution: Spawning a reverse shell or writing a persistence mechanism (cron job or modified binary).
- Lateral Movement: Using the BIG-IP as a jump box to attack internal servers.
Detection & Response
Due to the severity of active exploitation, defenders must assume that scans and exploitation attempts are already occurring.
Sigma Rules
---
title: F5 BIG-IP Potential Exploit - Management Interface Access
id: 8a4b2c1d-3e5f-4a6b-9c8d-1e2f3a4b5c6d
status: experimental
description: Detects suspicious access patterns to F5 BIG-IP management interfaces often associated with CVE-2025-53521 exploitation attempts, specifically targeting REST or TMUI endpoints.
references:
- https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog
author: Security Arsenal
date: 2026/03/27
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
product: nginx
detection:
selection:
c-uri|contains:
- '/mgmt/tm/util/bash'
- '/mgmt/shared/authn/login'
- '/tmui/login.jsp'
c-uri|contains:
- 'command'
- 'exec'
condition: selection
falsepositives:
- Legitimate administrative API usage from known internal blocks
level: critical
---
title: Linux Root Shell Spawned by Web Server - Potential BIG-IP Exploit
id: 9c5d3e2f-4a6b-7c8d-0e1f-2a3b4c5d6e7f
status: experimental
description: Detects the execution of a shell (bash/sh) spawned by the F5 BIG-IP web server process (httpd), which is highly indicative of successful RCE exploitation.
references:
- https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog
author: Security Arsenal
date: 2026/03/27
tags:
- attack.execution
- attack.t1059.004
logsource:
category: process_creation
product: linux
detection:
selection:
ParentImage|endswith: '/httpd'
Image|endswith:
- '/bash'
- '/sh'
UserName: 'root'
condition: selection
falsepositives:
- Authorized administrative troubleshooting (rare)
level: high
KQL (Microsoft Sentinel / Defender)
// Hunt for suspicious URI paths in F5 BIG-IP logs (via Syslog/CEF)
// Adjust 'Computer' or 'DeviceVendor' based on your ingestion format
Syslog
| where ProcessName contains "nginx" or SyslogMessage contains "BIG-IP"
| extend EventData = parse_(SyslogMessage) // If using CEF/JSON ingestion
| where SyslogMessage has_any("/mgmt/tm/util/bash", "/tmui/login.jsp", "command=run")
| project TimeGenerated, Computer, HostName, SyslogMessage, ProcessName
| extend Timestamp = TimeGenerated
// Hunt for process creation indicative of web shell activity on Linux endpoints
DeviceProcessEvents
| where InitiatingProcessFileName =~ "httpd"
| where FileName in~ ("bash", "sh", "nc", "perl", "python")
| project Timestamp, DeviceName, AccountName, InitiatingProcessFileName, FileName, ProcessCommandLine
Velociraptor VQL
-- Hunt for unexpected child processes of the BIG-IP httpd daemon
SELECT Pid, Name, CommandLine, Exe, Username, Parent.Pid AS ParentPid, Parent.Name AS ParentName, CreateTime
FROM pslist()
WHERE Parent.Name =~ "httpd"
AND Name =~ "(bash|sh|nc|perl|python|telnet)"
LIMIT 100
Remediation Script (Bash)
Run this script on the BIG-IP device to verify the current version and check for the presence of common webshells or suspicious users.
#!/bin/bash
# F5 BIG-IP Emergency Check for CVE-2025-53521 Indicators
# Run as root
echo "[*] Checking BIG-IP Version..."
tmsh show sys version | grep "Version"
echo "[*] Checking for recent modifications to /config/httpd/conf (Potential Webshells)..."
find /config/httpd -name ".jsp" -o -name ".php" -mtime -1
echo "[*] Checking for suspicious cron jobs..."
crontab -l -u root
echo "[*] Listing active network connections for reverse shells..."
netstat -antp | grep ESTABLISHED | grep -v "443\|80\|22"
echo "[*] Checking for recently added users..."
grep ":[0-9]_[0-9]:[0-9]:::" /etc/passwd
echo "[!] Verification Complete. If anomalies found, initiate Incident Response."
Remediation
Given the confirmed active exploitation, remediation must be treated as an emergency incident response activity rather than standard patch management.
-
Immediate Patching:
- Upgrade to the latest F5 BIG-IP software version. Check the official F5 Security Advisory for CVE-2025-53521 for the specific fixed versions (typically Q2 2026 or later hotfixes).
- Vendor Advisory: F5 Security Advisory (Placeholder link specific to the CVE).
-
Network Isolation (Emergency Control):
- Restrict management interface access (Port 443/TCP and 8443/TCP) strictly to trusted internal subnets. Block access to the management interface from the internet immediately.
- Ensure Self-IPs are not configured with "Port Lockdown" set to "Allow All" unless strictly necessary.
-
Configuration Hardening:
- Disable the REST API if not explicitly required for operations, or restrict it to specific source IP ranges using AFM (Advanced Firewall Manager) or the Management Port allow-list.
-
CISA Deadline:
- Per BOD 22-01, FCEB agencies must remediate this vulnerability by the deadline specified in the KEV entry (typically within weeks of catalog addition).
Related Resources
Security Arsenal Penetration Testing Services AlertMonitor Platform Book a SOC Assessment vulnerability-management Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.