BIG-IP APM TMM Crash via Undisclosed Traffic in Virtual Server APM Policy
CVE-2025-53521 Published on October 15, 2025
BigIP APM Vulnerability
When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Known Exploited Vulnerability
This F5 BIG-IP Unspecified Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. F5 BIG-IP APM contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution.
The following remediation steps are recommended / required by March 30, 2026: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2025-53521 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2025-53521 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2025-53521
Want to know whenever a new CVE is published for F5 Networks Big Ip? stack.watch will email you.
Affected Versions
F5 BIG-IP:- Version 17.5.0 and below 17.5.1.3 is affected.
- Version 17.1.0 and below 17.1.3 is affected.
- Version 16.1.0 and below 16.1.6.1 is affected.
- Version 15.1.0 and below 15.1.10.8 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.