Overview
Actively Exploited. CVE-2025-53521 is a remote code execution (RCE) vulnerability in F5 BIG-IP Access Policy Manager (APM). When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to unauthenticated remote code execution. This is a data plane issue — no control plane exposure. BIG-IP systems in Appliance mode are also vulnerable.
Recategorization to Critical RCE
This CVE was originally published on October 15, 2025 and categorized as a Denial-of-Service (DoS) vulnerability with CVSS scores of 7.5 (v3.1) and 8.7 (v4.0). In March 2026, based on new information, F5 re-categorized it as RCE — elevating it to CVSS 9.8 (v3.1) / 9.3 (v4.0) — CRITICAL. F5 simultaneously published an Indicators of Compromise article (K000160486), confirming in-the-wild exploitation.
Key implications of the recategorization:
- Initially underestimated: Publicly known since October 2025 as a lower-priority DoS issue. The March 2026 upgrade to RCE indicates attackers discovered the full exploitation potential — likely through active exploitation.
- 5+ months of exposure: Organizations that treated this as a DoS fix may have remained unpatched for months.
- Historical pattern: This follows a pattern seen with other network appliance vulnerabilities where initial DoS classifications are later found to be exploitable for full RCE — similar to past Citrix, Fortinet, and Ivanti disclosures.
Vulnerability Description
When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution. The root cause is CWE-770: Allocation of Resources Without Limits or Throttling. The vulnerable apmd process fails to properly limit resource allocation when processing specific crafted traffic directed at a virtual server with an APM access policy configured. An unauthenticated remote attacker can send malicious traffic to the data plane to trigger this flaw, achieving arbitrary code execution.
Pre-condition: The BIG-IP system must have an APM access policy configured on a virtual server to be vulnerable. Systems without APM access policies are not affected. Systems initially installed with a fixed BIG-IP version are not vulnerable.
Affected Products
Only F5 BIG-IP Access Policy Manager (APM) is affected. BIG-IQ, BIG-IP Next, F5OS, NGINX, F5 Distributed Cloud, and Traffix SDC are not vulnerable.
| Branch | Vulnerable Versions | Fixed Version |
|---|---|---|
| BIG-IP APM 17.5.x | 17.5.0 – 17.5.1 | 17.5.1.3 |
| BIG-IP APM 17.1.x | 17.1.0 – 17.1.2 | 17.1.3 |
| BIG-IP APM 16.1.x | 16.1.0 – 16.1.6 | 16.1.6.1 |
| BIG-IP APM 15.1.x | 15.1.0 – 15.1.10 | 15.1.10.8 |
Impact
BIG-IP APM appliances serve as VPN gateways, application access controllers, and authentication proxies for enterprise networks. Compromising a BIG-IP system can give attackers a foothold into the entire internal network, access to authentication credentials, and the ability to intercept or modify traffic for all applications behind the device.
Indicators of Compromise
F5 published IOC article K000160486 for all systems that were upgraded from a vulnerable version or are currently running a vulnerable version. Systems installed from scratch with a fixed BIG-IP version are not vulnerable and do not need IOC review.
If compromise is suspected, refer to K11438344 for incident response guidance. F5 strongly recommends rebuilding the configuration from scratch rather than restoring from UCS backups — backups from compromised systems can contain persistent malware.
Remediation
- Upgrade immediately to one of the patched firmware versions listed above.
- Review Indicators of Compromise — check K000160486 for all systems that were upgraded from or are running vulnerable versions.
- No vendor-provided mitigation exists — patching is the only remediation.
- If compromise is suspected: rebuild the configuration from scratch rather than restoring from UCS backups.
Acknowledgments: F5 credited Kristian Vlaardingerbroek, Hugo Trippaers, and other members of Schuberg Philis; Bart Vrancken; Fox-IT; and the National Cyber Security Centre (NCSC) Netherlands for their assistance and coordinated disclosure.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2025-53521 |
| Vendor / Product | F5 — BIG-IP APM |
| NVD Published | 2025-10-15 |
| NVD Last Modified | 2026-03-27 |
| CNA | F5 Networks |
| CVSS 3.1 Score | 9.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-770 |
| CISA KEV Added | 2026-03-27 |
| CISA KEV Deadline | 2026-03-30 |
| Known Ransomware Use | No |
| Affected Versions | BIG-IP APM 15.1.x – 17.5.x (see details) |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2025-10-15 | CVE published on NVD; F5 Advisory K000156741 released — categorized as DoS, CVSS 7.5 (v3.1) |
| 2026-03-27 | F5 re-categorizes vulnerability as RCE (CVSS 9.8 v3.1 / 9.3 v4.0); added to CISA KEV catalog |
| 2026-03-28 | F5 publishes IOC article K000160486 and updates advisory K000156741 |
| 2026-03-30 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2025-53521 | Vulnerability Database |
| F5 Security Advisory K000156741 | Vendor Advisory |
| F5 Indicators of Compromise — K000160486 | Indicators of Compromise |
| F5 Compromise Response Guidance — K11438344 | Incident Response |
| CISA KEV Catalog Entry | US Government |