Skip to content
.ca
3 mincritical

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added CVE-2025-53521, a Remote Code Execution vulnerability affecting F5 BIG-IP, to its Known Exploited Vulnerabilities (KEV) Catalog due to evidence of active exploitation. All organizations are strongly urged to prioritize timely remediation to reduce exposure to cyberattacks.

Sens:ImmediateConf:highAnalyzed:2026-03-28reports

Authors: CISA

Source:CISA

Key Takeaways

  • CISA added CVE-2025-53521, an F5 BIG-IP Remote Code Execution (RCE) vulnerability, to the Known Exploited Vulnerabilities (KEV) Catalog.
  • There is confirmed evidence of active exploitation of this vulnerability in the wild.
  • Federal Civilian Executive Branch (FCEB) agencies are mandated to remediate this vulnerability per Binding Operational Directive (BOD) 22-01.
  • All organizations are strongly urged to prioritize timely remediation of this vulnerability to reduce exposure to cyberattacks.

Affected Systems

  • F5 BIG-IP

Vulnerabilities (CVEs)

  • CVE-2025-53521

Attack Chain

Threat actors are actively exploiting CVE-2025-53521, a Remote Code Execution vulnerability in F5 BIG-IP systems. Successful exploitation allows attackers to execute arbitrary code on the affected public-facing devices, potentially leading to full system compromise and unauthorized network access.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

No specific detection rules or queries are provided in the CISA alert.

Detection Engineering Assessment

EDR Visibility: Low — F5 BIG-IP devices are proprietary network appliances that generally do not support standard endpoint detection and response (EDR) agent installations. Network Visibility: High — Exploitation of an edge device like F5 BIG-IP typically involves anomalous inbound network traffic and potentially anomalous outbound connections post-exploitation. Detection Difficulty: Moderate — Without specific exploit payload details, detection relies on identifying anomalous administrative access, unexpected shell execution, or unusual network traffic patterns targeting the F5 appliance.

Required Log Sources

  • Network flow logs
  • Web Application Firewall (WAF) logs
  • F5 BIG-IP system and access logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for anomalous inbound network requests to F5 BIG-IP management or traffic interfaces that deviate from normal baseline traffic, indicating potential exploitation attempts.Network flow logs, WAF logsInitial AccessMedium

Control Gaps

  • Lack of EDR telemetry on proprietary network appliances

Key Behavioral Indicators

  • Unexpected child processes spawned by F5 BIG-IP web services
  • Anomalous configuration changes on the F5 device
  • Unusual outbound network connections originating from the F5 appliance

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Apply the latest security patches or mitigations provided by F5 for CVE-2025-53521 immediately.

Infrastructure Hardening

  • Restrict access to the F5 BIG-IP management interface to trusted internal IP addresses only.
  • Implement Web Application Firewall (WAF) rules to block known exploit patterns if available.

User Protection

  • N/A

Security Awareness

  • Ensure vulnerability management teams are tracking CISA KEV additions and prioritizing them according to BOD 22-01 guidelines.

MITRE ATT&CK Mapping

  • T1190 - Exploit Public-Facing Application