Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»F5 BIG-IP Vuln Reclassified as RCE, Under Exploitation
    Cybersecurity

    F5 BIG-IP Vuln Reclassified as RCE, Under Exploitation

    adminBy adminApril 1, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    F5 BIG-IP Vuln Reclassified as RCE, Under Exploitation
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A critical security vulnerability in F5’s BIG-IP application security product line, which was first disclosed in October as a high-severity denial-of-service (DoS) flaw, is under active exploitation in the wild.

    F5 on Saturday also re-categorized CVE-2025-53521 as a remote code execution (RCE) flaw with a 9.8 CVSS score. The vulnerability initially was disclosed and patched on Oct. 15, when it was described as a DoS bug for the BIG-IP Access Policy Manager, with a CVSS score of 7.5.

    Because of “new information obtained in March 2026,” the CVE was revised as an RCE flaw with a significantly higher severity rating, according to F5’s updated advisory. It’s unclear what the new information entailed. Dark Reading contacted F5 for comment but the company did not respond by press time.

    CVE-2025-53521 Under Attack

    F5 also warned in the updated advisory that CVE-2025-53521 has been exploited in the wild. The US Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities (KEV) catalog on Friday.

    Related:AI-Driven Code Surge Is Forcing a Rethink of AppSec

    According to F5, a threat actor can exploit the critical bug by sending “specific malicious traffic” to virtual servers configured with BIG-IP AMP, which would give them RCE capabilities. 

    BIG-IP AMP versions 17.5.0 to 17.5.1, 17.1.0 to 17.1.2, 16.1.0 to 16.1.6, and 15.1.0 to 15.1.10 are vulnerable. F5 urged customers to upgrade to a fixed version. The network security vendor also said BIG-IP systems in running in appliance mode, which restricts administrative access to the systems, are still vulnerable to the flaw.

    F5 separately published indicators of compromise (IoCs) for the exploitation activity against CVE-2025-53521. The company noted that in cases of the successful deployment of malicious software tracked as c05d5254, organizations may detect files on disk such as /run/bigtlog.pipe and /run/bigstart.ltm, as well as mismatches of file sizes, hashes, and timestamps for known good versions of known good versions of /usr/bin/umount and /usr/sbin/httpd.

    The IoCs also included log entries, commands, and other tactics, techniques, and procedures used by the attackers. 

    Cybersecurity vendor Defused, meanwhile, said it observed scanning activity for CVE-2025-53521 following the addition of the flaw to CISA’s KEV catalog. 

    “This actor is hitting /mgmt/shared/identified-devices/config/device-info, which is a F5 BIG-IP REST API endpoint used to retrieve system-level information, such as hostname, machine ID, and base MAC address,” Defused said on Friday in a post on social media platform X.

    Related:Storm Brews Over Critical, No-Click Telegram Flaw

    It’s unclear when the exploitation activity first began. Simo Kohonen, founder and CEO of Defused, tells Dark Reading that his company’s BIG-IP honeypots are “more or less under attack consistently.” However, he says the company has observed some notable changes in the threat activity since Friday, including new ways of fingerprinting F5 instances.

    “Generic mass exploiters consistently use the same type of payload, but we’ve observed minor deviations to the payloads in the past week, which suggests more actors out there are looking at mapping out F5 infrastructure,” Kohonen says.

    F5 products have been frequently targeted by a wide range of threat actors. Last year, nation-state attackers breached F5 and stole sensitive data, including source code for the BIG-IP platform. 

    Given the increased risk posed by CVE-2025-53521, F5 customers should update their software and review their systems for any signs of compromise.

    BigIP exploitation RCE Reclassified Vuln
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI tried the Pixel’s new Transit mode, and I’m never taking a bus or train without it
    Next Article I replaced my expensive subscriptions with these free open source apps
    admin
    • Website

    Related Posts

    April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

    April 16, 2026

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Medium-severity flaw in Microsoft SharePoint exploited

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    NYT Strands hints and answers for Thursday, April 16 (game #774)

    April 16, 2026

    The Modern SEO Center Of Excellence: Governance, Not Guidelines

    April 16, 2026

    Raspberry Pi OS is getting a new security measure, and people are already annoyed

    April 16, 2026

    April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,338)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (821)
    • Tech Tools & Mobile / Apps (1,602)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    NYT Strands hints and answers for Thursday, April 16 (game #774)

    April 16, 2026

    The Modern SEO Center Of Excellence: Governance, Not Guidelines

    April 16, 2026

    Raspberry Pi OS is getting a new security measure, and people are already annoyed

    April 16, 2026
    Most Popular
    • NYT Strands hints and answers for Thursday, April 16 (game #774)
    • The Modern SEO Center Of Excellence: Governance, Not Guidelines
    • Raspberry Pi OS is getting a new security measure, and people are already annoyed
    • April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
    • YouTube Premium is now 50% off for certain Google One subscribers
    • Windows is getting stronger RDP file protections to fight phishing attacks
    • Google adds campaign-level filtering to bulk ad review appeals
    • MKBHD pulls back the curtain on LG’s cancelled rollable
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.