Source: 5-month-old F5 BIG-IP DoS bug becomes critical RCE exploited in the wild | CSO Online
Author: unknown
URL: https://www.csoonline.com/article/4152658/5-month-old-f5-big-ip-dos-bug-becomes-critical-rce-exploited-in-the-wild.html
ONE SENTENCE SUMMARY:
CVE-2025-53521 in F5 BIG-IP APM was misclassified, now exploited for pre-auth root RCE deploying persistent malware.
MAIN POINTS:
- CVE-2025-53521 was initially disclosed as DoS with CVSS 7.5 in October 2025.
- F5 reclassified it as pre-authentication remote code execution, raising severity to CVSS 9.8.
- CISA added the flaw to the KEV catalog due to confirmed active exploitation.
- Netherlands Cyber Security Centre reported observing in-the-wild exploitation of the vulnerability.
- Attackers deploy a persistent root-privileged malware tracked by F5 as “c05d5254”.
- Vulnerability impacts APM only when configured on a virtual server.
- Affected versions include 15.1.x, 16.1.x, 17.1.x, and 17.5.x ranges listed by F5.
- Fixed releases are 15.1.10.8, 16.1.6.1, 17.1.3, and 17.5.1.3.
- IoCs include /run/bigtlog.pipe, /run/bigstart.ltm, and modified umount/httpd binaries.
- Adversaries use localhost iControl REST access, SELinux disablement, and disguised HTTP 201 traffic.
TAKEAWAYS:
- Treat this as internet-facing, pre-auth RCE with immediate incident-response priority.
- Patch urgently, but also perform compromise assessment rather than trusting patch status alone.
- Use F5’s published IoCs, TTPs, and log patterns to hunt for successful exploitation.
- Avoid restoring potentially tainted UCS backups; rebuild configurations if compromise timing is unclear.
- Run integrity checks for key binaries, recognizing attackers may tamper with sys-eicheck dependencies.