Critical Alert: CISA Adds Actively Exploited F5 Vulnerability to KEV Catalog

 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a newly identified vulnerability to its Known Exploited Vulnerabilities (KEV) catalog after confirming that it is being actively exploited in real-world attacks.

The vulnerability, tracked as CVE-2025-53521, affects F5 BIG-IP Access Policy Manager (APM) and is considered highly critical due to its potential to enable remote code execution (RCE).

From DoS to Remote Code Execution

At first, the vulnerability was categorized as a Denial-of-Service (DoS) issue. However, further technical analysis revealed that it could be exploited to execute arbitrary code remotely.

This reclassification significantly increases its severity. Instead of merely disrupting services, attackers may now be able to gain full control over affected systems, making it a much more dangerous threat.

Evidence of Active Exploitation

The addition of this vulnerability to the KEV catalog confirms that it is already being used by threat actors in active campaigns.

Attackers are scanning for vulnerable and exposed systems, particularly targeting organizations running unpatched instances of F5 BIG-IP APM. This makes timely mitigation critical.

Recommended Actions

Organizations using affected systems should take immediate steps to reduce risk:

  • Apply the latest security patches and updates released by F5
  • Limit exposure of APM interfaces to the internet where possible
  • Monitor logs and network traffic for suspicious activity
  • Strengthen access controls and implement additional security layers

Delaying remediation increases the likelihood of compromise, especially given the active exploitation status.

Why This Is Important

This case highlights how quickly the threat landscape can evolve. A vulnerability initially believed to have limited impact can rapidly escalate into a critical security risk.

It also emphasizes the importance of continuously monitoring trusted sources such as CISA’s KEV catalog, which provides insight into vulnerabilities that are actively being exploited.

Resources

Comments

Popular posts from this blog

The Hidden Lag Killing Your SIEM Efficiency

Critical Vulnerability in Veeam Backup & Replication Exposes Enterprises to Remote Code Execution

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware