Back to all lessons
Awareness Learned
2 weeks ago

Critical F5 BIG-IP Vulnerability Exploited in Wild Despite Available Patches

A critical remote code execution vulnerability (CVE-2025-53521) in F5 BIG-IP Access Policy Manager was actively exploited by attackers despite patches being available. The vulnerability was initially misclassified as a denial-of-service issue with lower severity, which may have delayed urgent patching efforts by organizations. When the true nature of the flaw was discovered - allowing pre-authentication remote code execution with a CVSS score of 9.3 - it was already being exploited in the wild. This highlights how vulnerability misclassification and delayed patching can create dangerous security gaps that attackers quickly exploit.

Tactical Insight

Immediate actions

  • Patch F5 BIG-IP devices to the latest available version immediately
  • Scan for indicators of compromise on all internet-facing F5 appliances
  • Restrict management access to trusted networks only

Long-term improvements

  • Implement automated vulnerability scanning that prioritizes internet-facing infrastructure
  • Establish emergency patching procedures for critical network appliances
  • Maintain an accurate inventory of all network devices and their patch status

Detection measures

  • Monitor for unusual traffic patterns on F5 BIG-IP management ports
  • Set up alerts for exploitation attempts targeting CVE-2025-20029
  • Review logs for signs of lateral movement from compromised appliances