CVE-2025-53521
Vulnerability Summary
Timeline
Description
When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVSS Metrics
- v4.0•CRITICAL•Score: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
- v4.0•CRITICAL•Score: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- v3.1•CRITICAL•Score: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Trends
Current EPSS score: 0.08%• Percentile: 25%
Techniques & Countermeasures
- CWE-770•Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Affected Systems
- f5•big-ip
≥ 17.5.0, < 17.5.1.3 | ≥ 17.1.0, < 17.1.3 | ≥ 16.1.0, < 16.1.6.1 | ≥ 15.1.0, < 15.1.10.8
- f5•big-ip_access_policy_manager
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_advanced_firewall_manager
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_advanced_web_application_firewall
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_analytics
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_application_acceleration_manager
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_application_security_manager
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_application_visibility_and_reporting
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_automation_toolchain
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_carrier-grade_nat
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_container_ingress_services
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_ddos_hybrid_defender
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_domain_name_system
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_edge_gateway
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_fraud_protection_service
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_global_traffic_manager
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3
- f5•big-ip_link_controller
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_local_traffic_manager
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_policy_enforcement_manager
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_ssl_orchestrator
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_webaccelerator
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1
- f5•big-ip_websafe
≥ 15.1.0, < 15.1.10.8 | ≥ 16.1.0, < 16.1.6.1 | ≥ 17.1.0, < 17.1.3 | ≥ 17.5.0, ≤ 17.5.1