CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-53521
9.819.16%

CVE-2025-53521: Unauthenticated Remote Code Execution in F5 BIG-IP APM

Alon Barad
Alon Barad
Software Engineer

Mar 30, 2026·5 min read·5 visits

Active ExploitationCISA KEV Listed

Executive Summary (TL;DR)

Unauthenticated attackers can exploit a resource allocation flaw (CWE-770) in the F5 BIG-IP APM TMM process to trigger a denial of service or execute arbitrary code on the appliance.

CVE-2025-53521 is a critical vulnerability in the F5 BIG-IP Access Policy Manager (APM) that permits unauthenticated, remote attackers to achieve Remote Code Execution (RCE) or Denial of Service (DoS). The flaw exists in the Traffic Management Microkernel (TMM) process, which fails to appropriately throttle or limit resource allocation when handling specific malicious traffic directed at active APM policies.

Vulnerability Overview

The F5 BIG-IP Access Policy Manager (APM) provides secure access control, integrating authentication, authorization, and accounting (AAA) for enterprise applications. The core component responsible for executing these policies and processing inbound network traffic is the Traffic Management Microkernel (TMM).

CVE-2025-53521 is an unauthenticated vulnerability residing within the TMM process. When a virtual server is configured with an active APM access policy, it becomes susceptible to crafted HTTP requests that trigger a resource allocation failure.

The vulnerability holds a CVSS v3.1 base score of 9.8. It operates over the network without requiring prior authentication or user interaction. Successful exploitation inherently causes the TMM process to terminate and restart, resulting in a Denial of Service (DoS), but the underlying memory mismanagement can be leveraged to achieve Remote Code Execution (RCE).

Active exploitation in the wild has been observed since August 2025. The flaw is specifically tied to the processing of APM features, heavily implicating the DesktopDirect clientless VPN feature as a primary attack surface.

Root Cause Analysis

The root cause of CVE-2025-53521 is classified under CWE-770: Allocation of Resources Without Limits or Throttling. This weakness occurs when the software does not properly restrict the size or amount of resources requested by an external actor.

During the evaluation of an APM access policy, the TMM process parses incoming HTTP traffic to determine routing and authentication requirements. When processing requests targeting specific features, such as DesktopDirect, the parser allocates memory and state variables based on attacker-controlled input parameters.

The vulnerable code path lacks upper-bound validation for these allocations. An attacker sending a payload with intentionally malformed or oversized parameters forces the TMM to exhaust available memory or corrupt adjacent memory boundaries during the allocation phase.

While the immediate outcome is a failure of the TMM process leading to termination, the lack of spatial memory enforcement allows precise payloads to overwrite critical execution structures. This provides the primitives necessary to pivot from a resource exhaustion state to hijacking the instruction pointer.

Exploitation Methodology

Exploitation of CVE-2025-53521 requires network access to a BIG-IP virtual server configured with an active APM access policy. Attackers do not need valid credentials or an established session to initiate the attack.

The first phase of the attack involves reconnaissance to identify exposed APM interfaces. Attackers scan for specific URI structures indicative of APM policies, such as /renderer/, /my.policy, or /vpn/. These endpoints confirm that the TMM will process the traffic through the vulnerable APM logic.

Once a target is identified, the attacker transmits a specially crafted HTTP request. This request contains undisclosed payload structures targeting the DesktopDirect component. The payload is designed to exploit the missing size limits in the TMM's parsing routine, initiating an unbounded memory allocation sequence.

The TMM process attempts to handle the request and fails due to the CWE-770 condition. In a DoS scenario, the process crashes. In a weaponized RCE scenario, the memory corruption overwrites a function pointer or return address, transferring execution control to the attacker's shellcode within the context of the TMM.

Impact Assessment

The impact of CVE-2025-53521 is highly critical due to the privileges held by the affected component. The Traffic Management Microkernel operates at the core of the BIG-IP system, processing all unencrypted and decrypted traffic passing through the appliance.

In a Denial of Service scenario, the termination of the TMM process severs all active connections managed by the BIG-IP device. The system will attempt to restart the TMM, causing a temporary but complete disruption of service for all applications fronted by the virtual server.

When exploited for Remote Code Execution, the attacker gains arbitrary code execution with the privileges of the TMM. This allows the attacker to intercept, modify, or drop traffic. It also provides access to sensitive data stored in memory, including authentication tokens, session cookies, and private cryptographic keys.

Furthermore, compromise of the BIG-IP appliance provides a highly privileged pivot point into the internal network. Threat actors frequently utilize edge appliances as persistent footholds, bypassing perimeter defenses to launch secondary attacks against internal infrastructure.

Remediation and Detection

The vulnerability affects BIG-IP APM branches 15.1.x, 16.1.x, 17.1.x, and 17.5.x. The vendor has released updated versions that introduce proper boundary checks and resource throttling to the TMM parser. Organizations must upgrade to versions 17.5.1.3, 17.1.3, 16.1.6.1, or 15.1.10.8.

For detection, security teams should actively monitor system logs for anomalous behavior. Frequent, unexplained restarts of the TMM process recorded in /var/log/tmm or /var/log/ltm are strong indicators of attempted or successful exploitation.

Network detection strategies should focus on analyzing HTTP traffic destined for the virtual server. Security analysts should search for anomalous requests interacting with APM-specific URIs, paying particular attention to malformed parameters directed at the DesktopDirect feature.

CISA has mandated remediation for federal agencies by March 30, 2026. Given the confirmed active exploitation status and a high EPSS percentile of 95.31, immediate application of the vendor patches is required to secure vulnerable infrastructure.

Official Patches

F5F5 Security Advisory K000156741

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
19.16%
Top 5% most exploited

Affected Systems

F5 BIG-IP Access Policy Manager (APM)

Affected Versions Detail

Product
Affected Versions
Fixed Version
BIG-IP APM
F5
17.5.0 - 17.5.117.5.1.3
BIG-IP APM
F5
17.1.0 - 17.1.217.1.3
BIG-IP APM
F5
16.1.0 - 16.1.616.1.6.1
BIG-IP APM
F5
15.1.0 - 15.1.1015.1.10.8
AttributeDetail
CWE IDCWE-770
Attack VectorNetwork
CVSS v3.19.8
EPSS Score0.19158 (95.31%)
ImpactRemote Code Execution / Denial of Service
Exploit StatusActive
CISA KEVListed

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1499Endpoint Denial of Service
Impact
CWE-770
Allocation of Resources Without Limits or Throttling

Allocation of Resources Without Limits or Throttling

Vulnerability Timeline

Initial evidence of active exploitation in the wild observed by threat researchers.
2025-08-01
Vulnerability publicly disclosed by F5; patches released.
2025-10-15
F5 Threat Report links exploitation to the DesktopDirect feature.
2025-12-10
CISA adds CVE-2025-53521 to the Known Exploited Vulnerabilities (KEV) catalog.
2026-03-27
Due date for federal agencies to apply mitigations under BOD 22-01.
2026-03-30

References & Sources

  • [1]F5 Security Advisory K000156741
  • [2]CISA KEV Catalog
  • [3]NVD Detail
  • [4]ZeroPath Analysis

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.