Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Incident: Yakult Australia targeted in cyber attack, employee files published on dark web | ABC News Australia

    April 8, 2026

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
    News

    Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks

    adminBy adminApril 2, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    F5

    Internet threat-monitoring non-profit Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability.

    BIG-IP APM (short for Access Policy Manager) is F5’s centralized access management proxy solution designed to help admins secure access to their organizations’ networks, cloud, applications, and application programming interfaces (APIs).

    This 5-month-old flaw (tracked as CVE-2025-53521) was disclosed in October as a denial-of-service (DoS) vulnerability and was reclassified as an RCE bug over the weekend.

    “Due to new information obtained in March 2026, the original vulnerability is being re-categorized to an RCE. The original CVE remediation has been validated to address the RCE in the fixed versions. We have learned that this vulnerability has been exploited in the vulnerable BIG-IP versions,” F5 warned in a Sunday advisory update.

    Attackers without privileges are exploiting this security issue to gain remote code execution on unpatched BIG-IP APM systems with access policies configured on a virtual server.

    While there is no information on how many BIG-IP APM instances exposed on the Internet have a vulnerable configuration, Internet threat-monitoring non-profit Shadowserver said on Wednesday that it now tracks over 17,100 IPs with BIG-IP APM fingerprints.

    F5 BIG-IP APM exposed online
    F5 BIG-IP APM exposed online (Shadowserver)

    ​More than 14,000 BIG-IP APM systems remain exposed to CVE-2025-53521 attacks according to Shadowserver’s data, even though the U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered federal agencies to secure their BIG-IP APM systems by midnight on Monday (after adding the vulnerability to its list of actively exploited flaws on Friday).

    F5 has also shared published indicators of compromise (IOCs) and advised defenders to check the disks, logs, and terminal history of BIG-IP devices for signs of malicious activity. It also provides guidance on the measures to take after detecting evidence of compromise, including rebuilding the affected systems from scratch.

    “If customers do not know exactly when the system was compromised, user configuration set (UCS) backups may have been created after the compromise occurred,” the company said.

    “F5 strongly recommends that customers rebuild the configuration from a known good source because UCS files from compromised systems can contain persistent malware.”

    As a Fortune 500 technology giant, F5 provides cybersecurity, application delivery networking (ADN), and other services to over 23,000 customers, including 48 Fortune 50 companies.

    In recent years, BIG-IP vulnerabilities have been targeted by both nation-state and cybercrime threat groups to breach corporate networks, hijack devices, deploy data-wiping malware, map internal servers, and steal sensitive data.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-783261 V1.1 (Last Update: 2026-02-10): Denial of Service Vulnerability in Automation License Manager (ALM) Before V5.2
    Next Article SSA-864900 V1.7 (Last Update: 2026-02-10): Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices
    admin
    • Website

    Related Posts

    News

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026
    News

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Incident: Yakult Australia targeted in cyber attack, employee files published on dark web | ABC News Australia

    April 8, 2026

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.