BIG IP APM from DoS to CERs exploited in real life critical alert requiring immediate patch

Published 5 min de lectura 100 reading

F5 Networks has changed the gravity of a vulnerability in BIG-IP APM: what was originally considered a failure that could lead to service denials has now been reclassified as a critical vulnerability of remote code execution (CERs). This update is not just a technical nuance: it means that unprivileged attackers can run commands on affected teams and, according to F5, there is already evidence of exploitation in real environments to install webshells on unpatched devices.

BIG-IP APM - Access Policy Manager - acts as a centralized proxy to control and protect access to networks, clouds, applications and APIs. Its function makes it a strategic control point: compromising a BIG-IP APM means, in many cases, accessing an organization's entry door. The decision in question appears in the register as CVE-2025-53521, and F5 has pointed out that vulnerability can be exploited without authentication when access policies are active on a virtual server.

BIG IP APM from DoS to CERs exploited in real life critical alert requiring immediate patch
Image generated with IA.

That a problem goes from DoS to CERs radically changes the required response. While a denial of service is often limited to restoring availability, a remote execution involves possible persistent access and exfiltration of data: attackers have already taken advantage of this path to deploy webshells, small web back doors that allow remote equipment control and facilitate lateral movements within compromised networks.

F5 has published commitment indicators (IOCs) and recommendations to detect malicious activity in BIG-IP systems; urgent actions include reviewing disks, records and terminal history for handling prints. Its revised note explains that the correction previously released to mitigate the DoS also covers the CERs in the corrected versions, but stresses that holdings have been observed in vulnerable unparked versions. You can consult these resources directly on the F5 pages: IOCs published and update of the advice.

The magnitude of the risk is clearer if we consider the global deployment of BIG-IP: large organizations, service providers and public administrations rely on F5 teams to manage critical access. Shadowserver, the organization dedicated to the monitoring of threats on the Internet, estimates more than 240,000 BIG-IP instances visible on the Internet while there is no public breakdown indicating how many are in a vulnerable way against CVE-2025-53521.

The gravity of the situation led the United States Agency for Cyber Security and Infrastructure (CISA) to include this vulnerability in its catalogue of actively exploited vulnerabilities and to order federal agencies to apply mitigation or patches immediately, with a deadline set for the closing of the patch. In its statement, CISA recalls that these types of failures are frequent vectors for malicious actors and gives explicit instructions on applying supplier mitigation, following BOD 22-01 guidance for cloud services or even removing the product if there are no viable mitigation. You can see the CISA entrance here: public notice and the reference in the catalogue: CVE-2025-53521 in the catalog. For context on Directive BOD-22-01: BOD 22-01.

Those who work in cybersecurity already know the pattern: over the last few years, exploits have been detected against BIG-IP used by state and cybercriminal groups to penetrate corporate networks, map internal infrastructure, deploy destructive malware, kidnap devices and exfilter sensitive documents. The combination of public exposure, privileged functions and an extensive customer base makes any failure an attractive target.

What should the security officers do right now? The answer is clear and urgent: apply the official updates of the supplier if they are not already deployed; in parallel, carry out active system engagement searches. F5 also recommends that organizations consult their internal incident management and forensic policies before trying to restore equipment to ensure proper evidence collection. Review access logs, disk files, persistent processes and command history can reveal traces of webshells or other malicious activity.

If there is a suspicion of intrusion, isolating the affected device and activating a forensic laboratory or a specialized third party are prudent steps: recovering a system without having documented and preserved evidence can compromise further investigations and hide the actual scope of the gap. Do not assume that a quick restart or restoration erases the problem: An attacker who placed back doors may have left artifacts in multiple places.

BIG IP APM from DoS to CERs exploited in real life critical alert requiring immediate patch
Image generated with IA.

Organizations that cannot park immediately should consider temporary mitigation offered by the supplier and assess whether it is possible to temporarily reduce BIG-IP exposure (e.g. by limiting administrative access from public networks). It is not an ideal solution, but it can reduce the attack window while working on a permanent solution.

For professionals who need technical references and available indicators, the public register of vulnerability in NVD provides the formal description and related links: CVE-2025-53521 in NVD. The F5 notices and IOCs, mentioned above, are the primary source for detection and response.

In short, the reclassification of this failure highlights two constant lessons in safety: the need for patches and the importance of continuous monitoring. A team exposed on the Internet and with critical functions is not a luxury: it is an asset that must be given priority in risk management. If your organization uses BIG-IP APM, act now: check versions, deploy official patches, look for commitment signals and follow forensic response recommendations before restoring services.

Coverage

Related

More news on the same subject.