Cyber Posture

CVE-2025-53521

CriticalCISA KEVActive Exploitation

Published: 15 October 2025

Published
15 October 2025
Modified
31 March 2026
KEV Added
27 March 2026
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0745 91.8th percentile
Risk Priority 44 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-53521 is a stack-based buffer overflow vulnerability (CWE-121) in F5 BIG-IP Access Policy Manager (APM). It affects systems where an APM access policy is configured on a virtual server, allowing specific malicious traffic to trigger remote code execution (RCE). The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical. Software versions that have reached End of Technical Support (EoTS) are not evaluated for this issue.

An unauthenticated attacker with network access can exploit the vulnerability by sending crafted traffic to the affected virtual server. No user interaction or privileges are required, enabling low-complexity remote exploitation that results in full confidentiality, integrity, and availability impacts through arbitrary code execution on the BIG-IP system.

F5 has published a security advisory at https://my.f5.com/manage/s/article/K000156741 with details on affected versions and mitigation steps. The vulnerability is also listed in CISA's Known Exploited Vulnerabilities catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53521, indicating active real-world exploitation.

Details

CWE(s)
CWE-121
KEV Date Added
27 March 2026

Affected Products

f5
big-ip access policy manager
15.1.0 — 15.1.10.8 · 16.1.0 — 16.1.6.1 · 17.1.0 — 17.1.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote code execution via crafted traffic to a public-facing BIG-IP APM virtual server, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References