Critical Vulnerability

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known Exploited Vulnerabilities (KEV) c

What Happened

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has formally added a critical vulnerability, CVE-2025-53521, to its Known Exploited Vulnerabilities (KEV) catalog. This action follows confirmed evidence of active exploitation in the wild. The flaw affects F5’s BIG-IP Access Policy Manager (APM), a critical component for secure application access and network traffic management. By adding it to the KEV catalog, CISA has issued a binding directive for all Federal Civilian Executive Branch agencies to remediate the vulnerability by July 25, 2025.

Why It Matters

The KEV catalog serves as a high-priority list of vulnerabilities that pose significant, immediate risk due to active exploitation. CISA’s directive mandates federal action, but it also functions as a critical warning for all organizations using F5 BIG-IP. APM is a gateway security product, often deployed at the network edge to manage VPN and application access. A successful exploit could allow an unauthenticated attacker to bypass authentication controls, potentially gaining unauthorized access to sensitive internal networks and applications. This makes it a prime target for threat actors.

Technical Details

CVE-2025-53521 is a critical vulnerability in the F5 BIG-IP APM. While specific technical details of the exploit are not fully public, it is reported to be a pre-authentication remote code execution (RCE) or authentication bypass flaw. This means an attacker could exploit it without needing valid user credentials, typically by sending a specially crafted request to the vulnerable APM instance. The affected component is central to processing access policies, making any compromise severe. F5 has released patches and security advisories addressing this issue.

Immediate Risk

The risk is immediate and critical. CISA’s KEV designation is a reliable indicator that threat actors are actively weaponizing this flaw. Any unpatched F5 BIG-IP APM instance exposed to the internet is at high risk of compromise. The potential impact is severe: unauthorized network access, data exfiltration, lateral movement, and deployment of ransomware or other malware. Organizations must treat this with the highest urgency, prioritizing the identification and patching of all affected systems ahead of CISA’s deadline.

Security Insight

This event underscores the critical importance of swift patch management for internet-facing infrastructure, especially network perimeter devices like VPN gateways and access managers. Security teams should immediately inventory all F5 BIG-IP deployments, verify the APM module’s usage, and apply the relevant F5 security patches without delay. For systems that cannot be patched immediately, implementing strict network controls to limit access to the management interfaces and monitoring for anomalous authentication attempts is a necessary compensating control.

Share:

Never miss a security update

Get real-time security alerts delivered to your preferred platform.

Related News

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.