The United States Cybersecurity and Infrastructure Security Agency (CISA) has taken swift action in response to the active exploitation of a critical security vulnerability in F5 BIG-IP Access Policy Manager (APM), adding it to the Known Exploited Vulnerabilities (KEV) catalog. This move serves as a warning to organizations to promptly address the flaw, identified as CVE-2025-53521, which boasts a CVSS v4 score of 9.3, indicating a highly severe vulnerability.
CVE-2025-53521 poses a significant risk as it could facilitate remote code execution, a scenario where a threat actor gains the ability to execute arbitrary code on a vulnerable system. This could lead to a range of malicious activities, including data breaches, lateral movement within a network, and the deployment of additional malware.
CISA’s decision to include this vulnerability in the KEV catalog underscores the urgency with which organizations should approach its remediation. Given the evidence of active exploitation, it is crucial for entities using F5 BIG-IP APM to assess their exposure and apply the necessary patches or mitigations without delay.
