Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags Critical F5 BIG-IP Vulnerability Exploitation

CISA Flags Critical F5 BIG-IP Vulnerability Exploitation

Posted on March 28, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a significant security flaw affecting F5 BIG-IP Access Policy Manager (APM). This vulnerability, now part of CISA’s Known Exploited Vulnerabilities (KEV) catalog, has been actively exploited in the wild, prompting urgent attention.

Critical Vulnerability Details

Identified as CVE-2025-53521, this vulnerability carries a CVSS v4 score of 9.3. It poses a serious risk by potentially enabling remote code execution (RCE) when specific malicious traffic interacts with a BIG-IP APM-configured virtual server. Initially classified as a denial-of-service (DoS) issue with a lower severity score, recent information has led to its reclassification as an RCE threat.

F5 has acknowledged the exploitation of this flaw in certain BIG-IP versions but has not disclosed specifics about the attackers involved. The company has issued an advisory with indicators that system administrators can use to detect compromises.

Indicators of Compromise

F5 has provided several file-related and log-related indicators to help identify potential compromises. Notable file-related signs include the presence of certain files such as /run/bigtlog.pipe and discrepancies in file hashes, sizes, or timestamps for critical system files like /usr/bin/umount.

Log-related indicators involve unusual entries in system logs, particularly those showing unauthorized access to the iControl REST API from localhost. Additional tactics, techniques, and procedures (TTPs) observed include modifications to system integrity components, leading to unexpected tool failures, and HTTP/S traffic anomalies.

Steps for Mitigation

F5 has released patches for the affected BIG-IP versions, including 17.5.1.3, 17.1.3, 16.1.6.1, and 15.1.10.8. Federal Civilian Executive Branch agencies have been instructed to implement these updates by March 30, 2026, to mitigate the risks associated with this vulnerability.

According to Benjamin Harris, CEO of watchTowr, this vulnerability was initially perceived as a minor issue. However, the recent developments have elevated its risk profile significantly, necessitating immediate action to prevent potential exploitation.

Organizations using F5 BIG-IP systems are urged to apply the necessary patches and monitor their systems closely for any signs of compromise. The evolving nature of this threat underscores the importance of maintaining robust cybersecurity measures and staying informed about potential vulnerabilities.

The Hacker News Tags:CISA, CVE-2025-53521, Cybersecurity, Exploitation, F5 BIG-IP, network security, patch management, remote code execution, system integrity, Vulnerability

Post navigation

Previous Post: Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
Next Post: TA446 Uses DarkSword Exploit in Spear-Phishing Campaign

Related Posts

F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More The Hacker News
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub The Hacker News
CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials The Hacker News
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws The Hacker News
China-Linked Cyber Attacks Target South American Telecoms China-Linked Cyber Attacks Target South American Telecoms The Hacker News
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical SQL Injection Flaw Patched in SAP S/4HANA
  • Stealthy Vidar Stealer Campaign Evades EDR, Steals Data
  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical SQL Injection Flaw Patched in SAP S/4HANA
  • Stealthy Vidar Stealer Campaign Evades EDR, Steals Data
  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark