Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags Critical F5 BIG-IP Vulnerability Exploitation

CISA Flags Critical F5 BIG-IP Vulnerability Exploitation

Posted on March 28, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a significant security flaw affecting F5 BIG-IP Access Policy Manager (APM). This vulnerability, now part of CISA’s Known Exploited Vulnerabilities (KEV) catalog, has been actively exploited in the wild, prompting urgent attention.

Critical Vulnerability Details

Identified as CVE-2025-53521, this vulnerability carries a CVSS v4 score of 9.3. It poses a serious risk by potentially enabling remote code execution (RCE) when specific malicious traffic interacts with a BIG-IP APM-configured virtual server. Initially classified as a denial-of-service (DoS) issue with a lower severity score, recent information has led to its reclassification as an RCE threat.

F5 has acknowledged the exploitation of this flaw in certain BIG-IP versions but has not disclosed specifics about the attackers involved. The company has issued an advisory with indicators that system administrators can use to detect compromises.

Indicators of Compromise

F5 has provided several file-related and log-related indicators to help identify potential compromises. Notable file-related signs include the presence of certain files such as /run/bigtlog.pipe and discrepancies in file hashes, sizes, or timestamps for critical system files like /usr/bin/umount.

Log-related indicators involve unusual entries in system logs, particularly those showing unauthorized access to the iControl REST API from localhost. Additional tactics, techniques, and procedures (TTPs) observed include modifications to system integrity components, leading to unexpected tool failures, and HTTP/S traffic anomalies.

Steps for Mitigation

F5 has released patches for the affected BIG-IP versions, including 17.5.1.3, 17.1.3, 16.1.6.1, and 15.1.10.8. Federal Civilian Executive Branch agencies have been instructed to implement these updates by March 30, 2026, to mitigate the risks associated with this vulnerability.

According to Benjamin Harris, CEO of watchTowr, this vulnerability was initially perceived as a minor issue. However, the recent developments have elevated its risk profile significantly, necessitating immediate action to prevent potential exploitation.

Organizations using F5 BIG-IP systems are urged to apply the necessary patches and monitor their systems closely for any signs of compromise. The evolving nature of this threat underscores the importance of maintaining robust cybersecurity measures and staying informed about potential vulnerabilities.

The Hacker News Tags:CISA, CVE-2025-53521, Cybersecurity, Exploitation, F5 BIG-IP, network security, patch management, remote code execution, system integrity, Vulnerability

Post navigation

Previous Post: Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
Next Post: TA446 Uses DarkSword Exploit in Spear-Phishing Campaign

Related Posts

Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware The Hacker News
Ghost Campaign Targets Crypto Wallets via Malicious npm Packages Ghost Campaign Targets Crypto Wallets via Malicious npm Packages The Hacker News
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems The Hacker News
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot The Hacker News
What Attackers Are Doing With Them What Attackers Are Doing With Them The Hacker News
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
  • Cyberattack Hits European Commission’s AWS Account
  • Windows 11 Update to Block Untrusted Kernel Drivers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
  • Cyberattack Hits European Commission’s AWS Account
  • Windows 11 Update to Block Untrusted Kernel Drivers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark