DEV Community

Cover image for F5 Warns of Critical BIG-IP APM Zero-Day Exploited by Nation-State Actors
BeyondMachines for BeyondMachines

Posted on • Originally published at beyondmachines.net

F5 Warns of Critical BIG-IP APM Zero-Day Exploited by Nation-State Actors

Summary

F5 re-categorized a BIG-IP APM vulnerability (CVE-2025-53521) from a DoS to a critical 9.8 RCE after discovering active exploitation by a nation-state actor using memory-only webshells and lateral movement tools. The flaw allows unauthenticated attackers to execute code and gain full control over network access infrastructure.

Take Action:

If you have F5 BIG-IP APM devices, if possible make sure they are isolated from the internet and accessible from trusted networks only. Then immediately update to the fixed firmware versions (17.5.1.3, 17.1.3, 16.1.6.1, or 15.1.10.8). If you suspect a device has already been compromised, rebuild it from scratch - don't restore from backups, as they may contain persistent malware. Also, audit for disabled SELinux and unauthorized webshells.


Read the full article on BeyondMachines


This article was originally published on BeyondMachines

Top comments (0)