Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)
    Cybersecurity

    Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)

    adminBy adminMarch 28, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A critical unauthenticated remote code execution vulnerability (CVE-2025-53521) in F5’s BIG-IP Access Policy Manager (APM) solution is under active exploitation, the US Cybersecurity and Infrastructure Security Agency warned on Friday.

    BIG-IP CVE-2025-53521 exploited

    CISA added the flaw to its Known Exploited Vulnerabilities catalog after F5 updated the related security advisory,

    The advisory was initially published on October 15, 2025, when F5 confirmed a data breach that resulted in a “highly sophisticated nation-state threat actor” accessing – among other things – BIG-IP source code and information about undisclosed vulnerabilities.

    It was later revealed that the attackers are linked to China, were in the company’s network for at least 12 months, and may have deployed the Brickstorm backdoor on F5 customers’ systems.

    About CVE-2025-53521

    F5 BIG-IP APM provides access policy enforcement to secure access to apps, APIs, and data. It’s primarely used by enterprises, financial institutions, and government and public sector organizations.

    CVE-2025-53521 affects the apmd process – which processes live traffic – in BIG-IP APM versions 17.5.0 to 17.5.1, 17.1.0 to 17.1.2, 16.1.0 to 16.1.6, and 15.1.0 to 15.1.10.

    It was initially believed that CVE-2025-53521 could only lead to a disruption of the normal functioning of BIG-IP APM systems (i.e., “denial of service”).

    “Due to new information obtained in March 2026, the original vulnerability is being re-categorized to an RCE with CVSS scores of 9.8 (CVSS v3.1) and 9.3 (CVSS v4.0),” F5 now says.

    “When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to remote code execution. The BIG-IP system in Appliance mode is also vulnerable.”

    The patches provided by the company in October 2025 work as intended, though, and customers who have quickly updated to one of the fixed versions might have avoided compromise.

    Indicators of compromise are available

    Unfortunately, the advisory does not say when the exploitation of the flaw began, only that it was discovered in March 2026. It’s possible, then, that some of the BIG-IP APM systems out there might have been compromised before they were patched.

    F5 has published a list of known indicators of compromise associated with “malicious software c05d5254” and related activity, and is urging customers to check their BIG-IP systems.

    Customers may discover specific files on disk, changes to files, log entries that point to a local user disabling the SELinux security module, and specific HTTP/S traffic from the BIG-IP system.

    “We have observed cases of webshell being written to disk; however, the webshells have been observed to work in memory only, meaning the files listed [in the document] might not be modified,” the company noted.

    F5 has also detected the threat actor making modifications that would affect the functioning of sys-eicheck, the BIG-IP system integrity checker.

    “Our understanding at this time is that the threat actor modified [specific] components in one partition (original running version compromised) but failed to make the same modifications on the second partition (destination for upgrade). When the customer upgraded and rebooted into the second partition, the modifications to sys-eicheck components did not persist.”

    CISA has ordered US federal civilian agencies to assess exposure and mitigate risks related to CVE-2025-53521 exploitation by Monday (March 30).

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    APM attackers BigIP CVE202553521 exploiting RCE Systems vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleSamsung Galaxy S26 problems and how to fix them
    Next Article How SEO maturity unlocked a 133x ROAS in medical device marketing
    admin
    • Website

    Related Posts

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Search Ad Growth Slows As Social & Video Gain Faster

    April 16, 2026

    I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (824)
    • Tech Tools & Mobile / Apps (1,609)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Search Ad Growth Slows As Social & Video Gain Faster

    April 16, 2026
    Most Popular
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    • I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything
    • Cisco says critical Webex Services flaw requires customer action
    • This one chart exposes how far Pixel has fallen behind in mobile gaming
    • NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software
    • Google AI director outlines new content playbook
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.