Back to Intelligence

Urgent: Defending Against Active Exploitation of F5 BIG-IP APM (CVE-2025-53521)

SA
Security Arsenal Team
March 28, 2026
4 min read

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm by adding a critical security flaw, CVE-2025-53521, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability impacts F5 BIG-IP Access Policy Manager (APM) and carries a CVSS v4 score of 9.3, marking it as Critical.

What makes this announcement particularly urgent is the confirmation of active exploitation in the wild. For defenders, this is no longer a theoretical risk—it is an immediate threat. This post provides the technical details and defensive actions required to secure your infrastructure.

Technical Analysis

Vulnerability: CVE-2025-53521
Affected Product: F5 BIG-IP Access Policy Manager (APM)
Severity: Critical (CVSS v4: 9.3)
Attack Vector: Network-based
Impact: Unauthenticated Remote Code Execution (RCE)

F5 BIG-IP devices are high-value targets often positioned at the edge of the network, managing traffic for critical applications and authentication via the APM. This vulnerability allows an unauthenticated threat actor to execute arbitrary code on the system. Because the attack requires no authentication, it can be automated by botnets or advanced threat actors to gain a foothold in the network.

Once exploited, attackers gain system-level privileges on the BIG-IP device. From this vantage point, they can intercept traffic, move laterally to internal servers, or deploy ransomware. The addition to the KEV catalog implies that threat actors are already scanning for and exploiting this flaw.

Defensive Monitoring

Given the active exploitation status, security teams must immediately assume compromise and verify their defensive posture. Below are queries and scripts to aid in detection and patch verification.

1. Hunt for Suspicious APM Activity (KQL)

Use this KQL query in Microsoft Sentinel or Microsoft Defender to detect potential exploitation attempts or anomalous URI patterns targeting your F5 infrastructure. This query looks for suspicious HTTP requests often associated with exploit attempts against web interfaces.

KQL — Microsoft Sentinel / Defender
let F5_IPs = dynamic(["192.168.1.10", "10.0.0.5"]); // Add your F5 management/self-IPs here
DeviceNetworkEvents
| where RemoteIP in (F5_IPs) or LocalIP in (F5_IPs)
| where ActionType == "HttpConnectionAccepted"
| where FilePath has "/mgmt/" or FilePath has "/apm/"
| extend PathLength = strlen(FilePath)
| where PathLength > 200 // Long URLs are often indicators of buffer overflow attempts
| project TimeGenerated, SourceIp, DestinationIp, FilePath, UserAgent, RequestBody
| order by TimeGenerated desc

2. Verify BIG-IP Version and Patch Status (Bash)

This script can be run on a management server or directly on the F5 TMOS shell (via SSH) to check the current software version. Ensure your version matches the fixed versions listed in the F5 Security Advisory for CVE-2025-53521.

Bash / Shell
#!/bin/bash

# Check F5 BIG-IP Version
# Note: This requires elevated privileges or appropriate SSH access.

echo "Checking F5 BIG-IP Version..."

# Run the TMOS show version command
tmsh show sys version | grep "Version"

# Extract Version Number (Example logic, adjust based on specific output format)
VERSION=$(tmsh show sys version | grep "Version" | awk '{print $2}')
echo "Current Detected Version: $VERSION"

echo "----------------------------------------------------"
echo "Please compare this version against the F5 Security Advisory for CVE-2025-53521."
echo "If your version is older than the fixed release, immediate patching is required."

Remediation

Organizations must treat this as an emergency patching event.

1. Apply Updates Immediately

Review the official F5 Security Advisory for CVE-2025-53521 and upgrade to the latest fixed software release immediately. F5 typically provides Hotfixes or Major Point Releases to address these critical flaws.

2. CISA Binding Operational Directive (BOD) Compliance

For U.S. Federal Civilian Executive Branch (FCEB) agencies, CISA has set a deadline (typically three weeks from KEV addition) to patch this vulnerability. Private sector organizations are strongly encouraged to follow this timeline as well.

3. Restrict Access

Until patches can be applied:

  • Isolate Management Interfaces: Ensure BIG-IP management interfaces are not accessible from the public internet. Use a VPN or Jump Host with strict access control lists (ACLs).
  • Block Unused Ports: Ensure the APM configuration does not expose services to untrusted networks unnecessarily.

4. Post-Patch Validation

After patching:

  • Re-run the verification script to confirm the version update.
  • Review system logs for any signs of compromise during the window of exposure.

Related Resources

Security Arsenal Penetration Testing Services AlertMonitor Platform Book a SOC Assessment vulnerability-management Intel Hub

vulnerabilitycvepatchwindowsmicrosoftf5-big-ipcisa-kevvulnerability-management

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.