Update now! Attacks on F5 BIG-IP Access Policy Manager observed

The US IT security authority CISA warns of ongoing attacks on F5 BIG-IP Access Policy Manager.

listen Print view
Red skull on black background

(Image: Titima Ongkantong / Shutterstock.com)

2 min. read

IT managers who use F5 BIG-IP Access Policy Manager (APM) (now operating under the name “BIG-IP Zero Trust Access”) for app access management should urgently check if their appliance software is up to date. The US cybersecurity authority CISA has issued a warning that attacks on a security vulnerability in the system have been observed.

Specifically, CISA writes that the authority is aware of attacks on the vulnerability CVE-2025-53521. According to the vulnerability description, attackers can inject and execute malicious code from the internet using specific malicious traffic. The only prerequisite is that the BIG-IP APM access policy is configured on a virtual server (CVSS4 9.3, risk “critical”).

As F5 explains in its security advisory, the vulnerability was initially categorized as a denial-of-service vulnerability and received a CVSS4 risk rating of 8.7, corresponding to a high risk. Due to new information from March 2026, F5 has now reclassified it as remote code execution (RCE) with critical risk. F5 also adds the note: “We have learned that this vulnerability has been exploited in the vulnerable BIG-IP versions above.”

F5 has closed the security vulnerability with updated software packages. According to the manufacturer, F5 BIG-IP APM 17.5.1.3, 17.1.3, 16.1.6.1, and 15.1.10.8, as well as newer versions, no longer contain the security-relevant bug. Admins should apply the updates immediately.

Videos by heise

Last October, it became known that attackers could steal code and information about security vulnerabilities from F5. This led F5 to release patches for almost four dozen security vulnerabilities at once.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.