F5 Networks has changed the gravity of a vulnerability in BIG-IP APM: what was originally considered a failure that could lead to service denials has now been reclassified as a critical vulnerability of remote code execution (CERs). This update is not just a technical nuance: it means that unprivileged attackers can run commands on affected teams and, according to F5, there is already evidence of exploitation in real environments to install webshells on unpatched devices.
BIG-IP APM - Access Policy Manager - acts as a centralized proxy to control and protect access to networks, clouds, applications and APIs. Its function makes it a strategic control point: compromising a BIG-IP APM means, in many cases, accessing an organization's entry door. The decision in question appears in the register as CVE-2025-53521, and F5 has pointed out that vulnerability can be exploited without authentication when access policies are active on a virtual server.

That a problem goes from DoS to CERs radically changes the required response. While a denial of service is often limited to restoring availability, a remote execution involves possible persistent access and exfiltration of data: attackers have already taken advantage of this path to deploy webshells, small web back doors that allow remote equipment control and facilitate lateral movements within compromised networks.
F5 has published commitment indicators (IOCs) and recommendations to detect malicious activity in BIG-IP systems; urgent actions include reviewing disks, records and terminal history for handling prints. Its revised note explains that the correction previously released to mitigate the DoS also covers the CERs in the corrected versions, but stresses that holdings have been observed in vulnerable unparked versions. You can consult these resources directly on the F5 pages: IOCs published and update of the advice.
The magnitude of the risk is clearer if we consider the global deployment of BIG-IP: large organizations, service providers and public administrations rely on F5 teams to manage critical access. Shadowserver, the organization dedicated to the monitoring of threats on the Internet, estimates more than 240,000 BIG-IP instances visible on the Internet while there is no public breakdown indicating how many are in a vulnerable way against CVE-2025-53521.
The gravity of the situation led the United States Agency for Cyber Security and Infrastructure (CISA) to include this vulnerability in its catalogue of actively exploited vulnerabilities and to order federal agencies to apply mitigation or patches immediately, with a deadline set for the closing of the patch. In its statement, CISA recalls that these types of failures are frequent vectors for malicious actors and gives explicit instructions on applying supplier mitigation, following BOD 22-01 guidance for cloud services or even removing the product if there are no viable mitigation. You can see the CISA entrance here: public notice and the reference in the catalogue: CVE-2025-53521 in the catalog. For context on Directive BOD-22-01: BOD 22-01.
Those who work in cybersecurity already know the pattern: over the last few years, exploits have been detected against BIG-IP used by state and cybercriminal groups to penetrate corporate networks, map internal infrastructure, deploy destructive malware, kidnap devices and exfilter sensitive documents. The combination of public exposure, privileged functions and an extensive customer base makes any failure an attractive target.
What should the security officers do right now? The answer is clear and urgent: apply the official updates of the supplier if they are not already deployed; in parallel, carry out active system engagement searches. F5 also recommends that organizations consult their internal incident management and forensic policies before trying to restore equipment to ensure proper evidence collection. Review access logs, disk files, persistent processes and command history can reveal traces of webshells or other malicious activity.
If there is a suspicion of intrusion, isolating the affected device and activating a forensic laboratory or a specialized third party are prudent steps: recovering a system without having documented and preserved evidence can compromise further investigations and hide the actual scope of the gap. Do not assume that a quick restart or restoration erases the problem: An attacker who placed back doors may have left artifacts in multiple places.

Organizations that cannot park immediately should consider temporary mitigation offered by the supplier and assess whether it is possible to temporarily reduce BIG-IP exposure (e.g. by limiting administrative access from public networks). It is not an ideal solution, but it can reduce the attack window while working on a permanent solution.
For professionals who need technical references and available indicators, the public register of vulnerability in NVD provides the formal description and related links: CVE-2025-53521 in NVD. The F5 notices and IOCs, mentioned above, are the primary source for detection and response.
In short, the reclassification of this failure highlights two constant lessons in safety: the need for patches and the importance of continuous monitoring. A team exposed on the Internet and with critical functions is not a luxury: it is an asset that must be given priority in risk management. If your organization uses BIG-IP APM, act now: check versions, deploy official patches, look for commitment signals and follow forensic response recommendations before restoring services.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...