F5 BIG-IP vulnerability under active attack after RCE discovery

April 2, 20262 min read1 sources
Share:
F5 BIG-IP vulnerability under active attack after RCE discovery

A vulnerability in F5's BIG-IP networking devices, tracked as CVE-2025-53521, is being actively exploited by threat actors after being reclassified as a remote code execution (RCE) flaw. Initially disclosed as a high-severity denial-of-service (DoS) bug, the issue is now known to allow an unauthenticated attacker to execute commands and gain significant control over a compromised system.

The vulnerability resides in the BIG-IP Configuration utility, also known as the Traffic Management User Interface (TMUI). Attackers can exploit the flaw by sending a specially crafted HTTP request to an exposed management port. While F5 initially disclosed the vulnerability in October as a DoS flaw, new information revealed its more dangerous RCE capabilities, leading to active exploitation.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-53521 to its Known Exploited Vulnerabilities (KEV) catalog, confirming the active threat and mandating federal agencies to patch their systems.

A successful attack gives adversaries a powerful foothold inside a target network. BIG-IP devices often sit at critical network junctions, managing application traffic. Compromise can lead to data exfiltration, internal network pivoting, deployment of ransomware, or manipulation of network traffic.

Administrators are strongly urged to apply the security updates provided by F5 immediately. For systems that cannot be patched right away, F5 recommends implementing workarounds that involve restricting access to the TMUI. This includes blocking access from the internet and limiting it to a secure management network, which authorized personnel often access using a VPN.

Share:

// SOURCES

// RELATED

Former ransomware negotiator pleads guilty to working for BlackCat cyber gang

A trusted ransomware negotiator's guilty plea for colluding with the BlackCat gang reveals a shocking insider threat, eroding trust in the cyber respo

6 min readApr 24

Lotus Wiper: A deep dive into the malware targeting Venezuela's energy sector

A new wiper malware, Lotus Wiper, was found targeting Venezuela's energy sector. Our analysis covers its destructive methods and geopolitical implicat

7 min readApr 23

UK regulator launches investigation into Telegram over child safety failures

The UK's communications regulator, Ofcom, has launched a formal investigation into Telegram over its failure to prevent the sharing of CSAM.

6 min readApr 22

UK regulator to probe Telegram, teen chat sites for potential child safety violations

Ofcom launches its first major investigation under the new Online Safety Act, targeting Telegram over allegations of CSAM distribution, setting a majo

6 min readApr 22