Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

448+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
NEWS

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

CISA has added CVE-2025-53521, a critical vulnerability in F5 BIG-IP Access Policy Manager, to its Known Exploited Vulnerabilities catalog after...

Dylan H.

News Desk

March 28, 2026
5 min read

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-53521 to its Known Exploited Vulnerabilities (KEV) catalog, citing confirmed evidence of active in-the-wild exploitation. The vulnerability affects F5 BIG-IP Access Policy Manager (APM) — a critical component widely used by enterprises and federal agencies to manage secure application access and enforce network access policies.

What Is CVE-2025-53521

CVE-2025-53521 is a critical security vulnerability in F5 BIG-IP Access Policy Manager (APM). While the full technical details of the flaw's class have not been publicly disclosed at the time of CISA's KEV addition, the confirmed active exploitation and CISA's decision to add it to the catalog signals:

  • The vulnerability is exploitable remotely, likely with minimal or no authentication
  • Reliable exploits are available to threat actors, evidenced by observed in-the-wild attacks
  • The potential impact is significant enough to warrant mandatory remediation for federal agencies under Binding Operational Directive (BOD) 22-01

F5 BIG-IP APM is specifically used to control and secure user access to enterprise applications, acting as a policy enforcement gateway for authentication, SSO, and access control. A vulnerability in this component could allow attackers to:

  • Bypass access policy controls — gaining unauthorized access to protected applications
  • Intercept authentication traffic — capturing credentials or session tokens in transit
  • Establish persistent access — leveraging the APM's central network position for lateral movement

CISA KEV Catalog and BOD 22-01

The Known Exploited Vulnerabilities catalog was established by CISA in November 2021 under Binding Operational Directive 22-01. Its purpose is to maintain a curated, authoritative list of vulnerabilities with confirmed real-world exploitation — providing a clear prioritization signal for federal agencies and, by extension, the broader security community.

Under BOD 22-01:

  • Federal civilian executive branch (FCEB) agencies are required to remediate all KEV-listed vulnerabilities within CISA-specified deadlines
  • Deadlines are typically two to three weeks from catalog addition for critical vulnerabilities
  • Non-compliance can affect agency security posture assessments and oversight reporting

While BOD 22-01 mandates apply only to federal agencies, CISA explicitly recommends all organizations prioritize KEV vulnerabilities in their patching programs — particularly when the affected product is a widely deployed network security appliance like F5 BIG-IP.

F5 BIG-IP APM: A High-Value Target

F5 BIG-IP is among the most widely deployed application delivery and network access platforms across enterprise and government environments. Its APM module specifically sits at the intersection of:

  • Identity and authentication — handling SSO, MFA enforcement, and policy-based access decisions
  • Network perimeter security — processing all inbound user traffic before it reaches application servers
  • Sensitive credential flows — acting as an intermediary for user login processes

This position makes F5 BIG-IP APM an exceptionally high-value target for threat actors. Historical exploitation of F5 products has been linked to:

  • Nation-state APT groups seeking persistent network access
  • Ransomware operators using BIG-IP as an initial access vector
  • Access brokers who sell compromised enterprise network footholds on underground markets

Recommended Actions

Organizations running F5 BIG-IP APM should treat CVE-2025-53521 as a critical priority:

  1. Consult F5's official security advisory for CVE-2025-53521 — identify the specific BIG-IP versions affected and the corresponding fixed releases
  2. Apply F5's patch immediately — given CISA KEV addition and confirmed active exploitation, treat this as an emergency change
  3. Audit BIG-IP APM access logs for indicators of compromise, including unusual authentication patterns, unexpected administrative access, or policy modification events
  4. Restrict management interface exposure — ensure the BIG-IP management interface (TMUI) is not internet-accessible
  5. Review user accounts and policies — check for unauthorized changes to APM access policies, user accounts, or authentication configurations
  6. Engage F5 support or incident response if compromise is suspected — forensic investigation may require vendor assistance
# Check BIG-IP version from TMSH (Traffic Management Shell)
tmsh show sys version
 
# Review recent configuration changes
tmsh show sys log recent | grep -i "change\|modify\|create" | tail -100
 
# Check for unexpected admin sessions
tmsh show sys session | grep -i admin
 
# List active APM policies
tmsh list apm policy access-policy

Broader Context: Network Edge Vulnerability Exploitation

CVE-2025-53521 continues a broader trend of threat actors prioritizing network security appliance vulnerabilities as initial access vectors. High-profile exploitation campaigns in recent years have targeted:

  • Citrix NetScaler (multiple CVEs)
  • Ivanti Connect Secure
  • Fortinet FortiGate and FortiOS
  • Palo Alto Networks GlobalProtect
  • SolarWinds Orion and Web Help Desk

Network security appliances are attractive because they are:

  • Internet-facing by design — no additional exposure is required to reach them
  • Often running older or unpatched firmware — update cycles for appliances are more friction-heavy than for software
  • Highly privileged — a compromised gateway often provides direct internal network access

Key Takeaways

  • CISA has added CVE-2025-53521 to the KEV catalog following confirmed active exploitation of F5 BIG-IP Access Policy Manager
  • Federal agencies must remediate per BOD 22-01 deadlines; all organizations are strongly advised to prioritize
  • F5 BIG-IP APM occupies a critical network access enforcement position — compromise can enable authentication bypass and lateral movement
  • Apply F5's patch immediately and conduct a thorough compromise assessment of affected appliances
  • Active exploitation is confirmed — unpatched systems face imminent risk

Source: The Hacker News

#CISA#F5#BIG-IP#CVE-2025-53521#KEV#Vulnerability#Active Exploitation#The Hacker News#Federal

Related Articles

CISA: New Langflow Flaw Actively Exploited to Hijack AI Workflows

CISA has added CVE-2026-33017, a critical unauthenticated remote code execution vulnerability in the Langflow AI framework, to its Known Exploited...

5 min read

Citrix NetScaler CVE-2026-3055 (CVSS 9.3) Under Active Reconnaissance

Security researchers at Defused Cyber and watchTowr have detected active reconnaissance targeting CVE-2026-3055, a critical CVSS 9.3 memory overread flaw...

4 min read

CISA Adds Zimbra XSS and SharePoint RCE to KEV; Cisco FMC Zero-Day Tied to Ransomware

CISA added actively exploited Zimbra Collaboration Suite and Microsoft SharePoint vulnerabilities to its Known Exploited Vulnerabilities catalog on March...

7 min read
Back to all News