Critical RCE Vulnerability in F5 BIG-IP Under Exploitation
CVE-2025-53521 could allow an unauthenticated attacker to execute code remotely
Summary
CVE-2025-53521 could allow an unauthenticated attacker to execute code remotely
Affected platforms
The following platforms are known to be affected:
Threat details
CVE-2025-53521 Under Exploitation
F5 has reported exploitation of CVE-2025-53521 in the wild, and the US Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog. The NHS England National CSOC assesses it is almost certain there will be further exploitation in the immediate future.
Edge devices like F5 BIG-IP are often internet-facing by design and are highly attractive targets to attackers, and there are an increasing number of edge device vulnerabilities disclosed each year that are rapidly exploited by attackers. The NHS England National CSOC assesses it is highly likely vulnerabilities discovered in edge devices will continue to be exploited as zero-day vulnerabilities, or shortly after vendor disclosure.
Organisations are strongly encouraged to follow NCSC's vulnerability management guidance, including patching edge devices as soon as possible if a critical vulnerability is identified.
Introduction
In October 2025, F5 published a security advisory for CVE-2025-53521, reporting it as a denial-of-service vulnerability. F5 has now updated their advisory to reflect that CVE-2025-53521 could allow an unauthenticated attacker to execute code remotely. CVE-2025-53521 is under exploitation.
- CVE-2025-53521 - Remote Code Execution vulnerability - CVSSv4 base score: 9.3
Remediation advice
Affected organisations must review F5 security advisory K000156741 and follow the remediation steps below.
Remediation steps
| Type | Step |
|---|---|
| Patch |
Required: Patch Organisations must upgrade BIG-IP APM to a fixed version. Fixed versions include:
Note: F5 does not evaluate vulnerabilities against devices that have reached End of Technical Support (EoTS). Organisations running an EoTS version must upgrade to a supported version. https://my.f5.com/manage/s/article/K000156741 |
| Action |
Strongly Recommended: Compromise Assessment Organisations that are running a vulnerable version of BIG-IP APM, or have upgraded from a vulnerable version, are strongly encouraged to review F5 security advisory K000160486 and perform a compromise assessment of their appliance. If evidence of compromise is detected, organisations must immediately report this to the NHS England National Cyber Security Operations Centre (CSOC) by calling 0300 303 5222 or emailing [email protected]. https://my.f5.com/manage/s/article/K000160486 |
Definitive source of threat updates
Last edited: 30 March 2026 10:24 am