CVE-2025-53521
CRITICALCVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
5Tags
Description
When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Analysis
F5 BIG-IP APM (Access Policy Manager) contains a remote code execution vulnerability triggered by specific malicious traffic when an access policy is configured on a virtual server.
Technical Context
The CWE-770 allocation of resources without limits vulnerability in BIG-IP APM's access policy processing can be exploited through crafted traffic to achieve remote code execution on the BIG-IP device.
Affected Products
['F5 BIG-IP with APM access policy configured']
Remediation
Apply F5 security updates. Remove APM configurations from internet-facing virtual servers if not required. Restrict management access to BIG-IP.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today