Signal

Over 14,000 F5 BIG-IP APM instances remain vulnerable to critical remote code execution exploit

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-04-02 00:52 UTCUpdated 2026-04-02 08:25 UTC
rss
cveexploitsincident_responsesecurity_tooling
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.
2 top sources shown
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
bleepingcomputer_all · News · bleepingcomputer.com · 2026-04-02 08:25 UTC
UPDATE ALERT F5 BIG-IP APM: CVSS (Max): 9.8
AusCERT - Bulletins · News · portal.auscert.org.au · 2026-04-02 00:52 UTC
limited source diversity in top sources
Overview

A critical remote code execution vulnerability (CVE-2025-53521) in F5 BIG-IP APM devices continues to expose over 14,000 instances online. Initially classified as a denial-of-service flaw, it has been reclassified as RCE and confirmed exploited in the wild.

Score total
0.99
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
Why now
  • Active exploitation confirmed, increasing immediate risk to exposed systems.
  • Over 14,000 vulnerable instances remain accessible online, indicating slow remediation.
  • Reclassification from DoS to RCE raises severity and potential impact.
Why it matters
  • Allows unauthenticated attackers to execute arbitrary code remotely, risking full system compromise.
  • Widespread exposure of vulnerable devices increases likelihood of successful exploitation.
  • Inclusion in CISA's KEV catalog emphasizes critical urgency for patching.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
  • CVE-2025-53521 is a critical remote code execution vulnerability actively exploited in the wild.
  • Over 14,000 F5 BIG-IP APM instances remain exposed online, increasing attack surface.
  • The vulnerability is listed in CISA's Known Exploited Vulnerabilities catalog, underscoring urgency for patching.
How sources frame it
  • Security News Sources: neutral
This ongoing critical vulnerability in F5 BIG-IP APM devices requires immediate attention due to confirmed active exploitation and widespread exposure.
All evidence
All evidence
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks
bleepingcomputer_all · bleepingcomputer.com · 2026-04-02 08:25 UTC
UPDATE ALERT F5 BIG-IP APM: CVSS (Max): 9.8
AusCERT - Bulletins · portal.auscert.org.au · 2026-04-02 00:52 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
  • bleepingcomputer_all (1)
  • AusCERT - Bulletins (1)
Top origin domains (this list)
  • bleepingcomputer.com (1)
  • portal.auscert.org.au (1)