By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
Computing

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

News Room
Last updated: 2026/03/31 at 10:43 PM
News Room Published 31 March 2026
Share
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
SHARE

Ravie LakshmananMar 28, 2026Vulnerability / Network Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerability in question is CVE-2025-53521 (CVSS v4 score: 9.3), which could allow a threat actor to achieve remote code execution.

“When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE),” according to a description of the flaw in CVE.org.

While the shortcoming was initially categorized and remediated as a denial-of-service (DoS) vulnerability with a CVSS v4 score of 8.7, F5 said it has been reclassified as a case of RCE in light of “new information obtained in March 2026.”

The company has since updated its advisory to confirm that the vulnerability “has been exploited in the vulnerable BIG-IP versions.” It did not share any additional details on who may be behind the exploitation activity.

However, F5 published a number of indicators that can be used to assess if the system has been compromised –

  • File-related indicators –
    • Presence of /run/bigtlog.pipe and/or /run/bigstart.ltm.
    • Mismatch of file hashes when compared to known good versions of /usr/bin/umount and/or /usr/sbin/httpd.
    • Mismatch of file sizes or timestamps when compared to known good versions of /usr/bin/umount and/or /usr/sbin/httpd.
    • Each release and EHF may have different file sizes and timestamps.
  • Log-related indicators –
    • An entry in “/var/log/restjavad-audit..log” showing a local user accessing the iControl REST API from localhost.
    • An entry in “/var/log/auditd/audit.log.” showing a local user accessing the iControl REST API from localhost to disable SELinux.
    • Log messages in “/var/log/audit” show the results of a command being run in the audit log.
  • Other TTPs observed include –
    • Modifications to the underlying components that the system integrity checker, sys-eicheck, relies on, resulting in a failure of the tool, specifically /usr/bin/umount and/or /usr/sbin/httpd, indicating unexpected changes to the system software as mentioned above.
    • HTTP/S traffic from the BIG-IP system that contains HTTP 201 response codes and CSS content-type to disguise the attacker’s activities.
    • Changes to the following three files, although their presence alone does not signal a security issue –
      • /var/sam/www/webtop/renderer/apm_css.php3
      • /var/sam/www/webtop/renderer/full_wt.php3
      • /var/sam/www/webtop/renderer/webtop_popup_css.php3

“We have observed cases of webshell being written to disk; however, the webshells have been observed to work in memory only, meaning the files listed above might not be modified,” F5 cautioned.

The issue impacts the following versions –

  • 17.5.0 – 17.5.1 (Fixed in version 17.5.1.3)
  • 17.1.0 – 17.1.2 (Fixed in version 17.1.3)
  • 16.1.0 – 16.1.6 (Fixed in version 16.1.6.1)
  • 15.1.0 – 15.1.10 (Fixed in version 15.1.10.8)

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies have been given until March 30, 2026, to apply the fixes to secure their networks.

“When F5 CVE-2025-53521 first emerged last year as a denial-of-service issue, it didn’t immediately signal urgency, and many system administrators likely prioritized it accordingly,” watchTowr CEO and founder Benjamin Harris said in a statement shared with The Hacker News.

“Fast forward to today’s big ‘yikes’ moment: the situation has changed significantly. What we’re observing now is pre-auth remote code execution and evidence of in-the-wild exploitation, with a CISA KEV listing to back it up. That’s a very different risk profile than what was initially communicated.”

Defused Cyber, in an X post, has also confirmed that it’s seeing “acute scanning activity” for vulnerable F5 BIG-IP devices following the addition of CVE-2025-53521 to the KEV catalog.

“This actor is hitting /mgmt/shared/identified-devices/config/device-info which is a F5 BIG-IP REST API endpoint used to retrieve system-level information, such as hostname, machine ID, and base MAC address,” it said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article This is Google’s new screenless Fitbit band to take on Whoop This is Google’s new screenless Fitbit band to take on Whoop
Next Article Study: Cost Savings and ROI Are Most Important for AI Success – Tech.co Study: Cost Savings and ROI Are Most Important for AI Success – Tech.co
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

England vs. Japan Livestream: How to Watch International Friendly Soccer Free
England vs. Japan Livestream: How to Watch International Friendly Soccer Free
News
Having a conversation and creating best practices for your child’s social media use
News
Chasing Starlink, Amazon Leo strikes satellite Wi-Fi deal for future Delta flights
Chasing Starlink, Amazon Leo strikes satellite Wi-Fi deal for future Delta flights
Computing
Apple, Google and other U.S. tech firms are threatened by Iran’s Revolutionary Guard
Apple, Google and other U.S. tech firms are threatened by Iran’s Revolutionary Guard
News

You Might also Like

Chasing Starlink, Amazon Leo strikes satellite Wi-Fi deal for future Delta flights
Computing

Chasing Starlink, Amazon Leo strikes satellite Wi-Fi deal for future Delta flights

3 Min Read
Servo 0.0.6 Released With Many Great Improvements
Computing

Servo 0.0.6 Released With Many Great Improvements

1 Min Read
RoboSense posts first quarterly profit as robotics business leads 2025 growth · TechNode
Computing

RoboSense posts first quarterly profit as robotics business leads 2025 growth · TechNode

1 Min Read
Nigeria’s Internet usage drops to 1.26M terabytes in February
Computing

Nigeria’s Internet usage drops to 1.26M terabytes in February

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?