4:35PM, 30 March 2026
TLP Rating:
CVE-2025-53521 affecting F5 Big-IP Access Policy Manager
The NCSC would like to draw your attention to CVE-2025-53521 affecting F5 Big-IP Access Policy Manager. We are aware of open-source reports of malicious threat actors exploiting this vulnerability in the wild.
When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).
Note: This known vulnerability was previously categorised and remediated as a Denial-of-Service (DoS) vulnerability with CVSS scores of 7.5 (CVSS v3.1) and 8.7 (CVSS v4.0).
Due to new information obtained in March 2026, the original vulnerability is being re-categorised to an RCE vulnerability with CVSS scores of 9.8 (CVSS v3.1) and 9.3 (CVSS v4.0).
What's happening
Systems affected
Affected versions are
- 17.5.0 - 17.5.1
- 17.1.0 - 17.1.2
- 16.1.0 - 16.1.6
- 15.1.0 - 15.1.10
What to do
Prevention
To prevent exploitation, update affected products to a patched version.
More information
Read more about this alert on the vendor website:
BIG-IP APM vulnerability CVE-2025-53521 External Link
If you require more information or further support, submit a report on our website:
Report an incident
If you need assistance using the tool, call us on 0800 114 115. Calling us is free within New Zealand. We’re open 7am to 7pm, Monday to Friday, and we’re closed on public holidays.
How helpful was this page?
This site is protected by reCAPTCHA and the Google Privacy Policy External Link and Terms of Service External Link apply.