Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags Critical F5 BIG-IP Vulnerability Exploitation

CISA Flags Critical F5 BIG-IP Vulnerability Exploitation

Posted on March 28, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a significant security flaw affecting F5 BIG-IP Access Policy Manager (APM). This vulnerability, now part of CISA’s Known Exploited Vulnerabilities (KEV) catalog, has been actively exploited in the wild, prompting urgent attention.

Critical Vulnerability Details

Identified as CVE-2025-53521, this vulnerability carries a CVSS v4 score of 9.3. It poses a serious risk by potentially enabling remote code execution (RCE) when specific malicious traffic interacts with a BIG-IP APM-configured virtual server. Initially classified as a denial-of-service (DoS) issue with a lower severity score, recent information has led to its reclassification as an RCE threat.

F5 has acknowledged the exploitation of this flaw in certain BIG-IP versions but has not disclosed specifics about the attackers involved. The company has issued an advisory with indicators that system administrators can use to detect compromises.

Indicators of Compromise

F5 has provided several file-related and log-related indicators to help identify potential compromises. Notable file-related signs include the presence of certain files such as /run/bigtlog.pipe and discrepancies in file hashes, sizes, or timestamps for critical system files like /usr/bin/umount.

Log-related indicators involve unusual entries in system logs, particularly those showing unauthorized access to the iControl REST API from localhost. Additional tactics, techniques, and procedures (TTPs) observed include modifications to system integrity components, leading to unexpected tool failures, and HTTP/S traffic anomalies.

Steps for Mitigation

F5 has released patches for the affected BIG-IP versions, including 17.5.1.3, 17.1.3, 16.1.6.1, and 15.1.10.8. Federal Civilian Executive Branch agencies have been instructed to implement these updates by March 30, 2026, to mitigate the risks associated with this vulnerability.

According to Benjamin Harris, CEO of watchTowr, this vulnerability was initially perceived as a minor issue. However, the recent developments have elevated its risk profile significantly, necessitating immediate action to prevent potential exploitation.

Organizations using F5 BIG-IP systems are urged to apply the necessary patches and monitor their systems closely for any signs of compromise. The evolving nature of this threat underscores the importance of maintaining robust cybersecurity measures and staying informed about potential vulnerabilities.

The Hacker News Tags:CISA, CVE-2025-53521, Cybersecurity, Exploitation, F5 BIG-IP, network security, patch management, remote code execution, system integrity, Vulnerability

Post navigation

Previous Post: Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
Next Post: TA446 Uses DarkSword Exploit in Spear-Phishing Campaign

Related Posts

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability The Hacker News
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks The Hacker News
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine The Hacker News
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The Hacker News
Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware The Hacker News
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mac Users Face New Cloudflare-Themed Malware Threat
  • Critical Citrix NetScaler Flaw Under Active Scrutiny
  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark