Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices.

BleepingComputer

F5 BIG-IP APM vulnerability (CVE-2025-53521) escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately.

Read: https://hackread.com/critical-f5-big-ip-flaw-upgrad-to-9-8-rce-exploited/

#CyberSecurity #F5 #Vulnerability #DDoS #RCE

Critical F5 BIG-IP Flaw Upgraded to 9.8 RCE, Exploited in the Wild

F5 BIG-IP APM flaw CVE-2025-53521 escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately.

Hackread - Cybersecurity News, Data Breaches, AI and More

13077 TOWNSEND RD #F5

*owned by*

KIRSHENBAUM ASSETS GROUP
236 SYCAMORE CIR
FEASTERVILLE TREVOSE PA

F5 BIG-IP flaw escalated to CRITICAL RCE, now exploited in the wild. Full system compromise risk for enterprises. Inventory devices, isolate from untrusted networks, and watch for patches. No CVE/patch yet — monitor advisories. https://radar.offseq.com/threat/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-ex-7117a302 #OffSeq #F5 #RCE

F5 BIG-IP CVE-2025-53521 reclassified from DoS to RCE (CVSS 9.3). Active exploitation confirmed. Vendor severity upgrades mean the threat model changed. Check indicators, patch immediately. 🔓🔥

https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html

#infosec #cybersecurity #F5 #CVE #RCE

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

CISA adds actively exploited F5 BIG-IP APM CVE-2025-53521 (CVSS 9.3) to KEV, ordering FCEB patch by March 30, 2026 to curb RCE risk.

The Hacker News
CVE Alert: CVE-2026-32647 - F5 - NGINX Open Source - RedPacket Security

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or

RedPacket Security
CVE Alert: CVE-2026-27651 - F5 - NGINX Open Source - RedPacket Security

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This

RedPacket Security
CVE Alert: CVE-2026-27784 - F5 - NGINX Open Source - RedPacket Security

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write

RedPacket Security
CVE Alert: CVE-2026-27654 - F5 - NGINX Open Source - RedPacket Security

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX

RedPacket Security

I am proud to announce that Restsh is now released under the GPLv3.

Restsh is a shell environment to work with REST-API's on the command line. It is designed to be used interactively, in scripts or in CI/CD pipelines. It is preliminary designed for the #f5 BIG-IP and #gitlab automation.

I am working since two years on this project and my employer allowed me to release it to the public after it has proved to be very useful in automation projects and day to day work.

https://github.com/AxiansITSecurity/Restsh

GitHub - AxiansITSecurity/Restsh: The shell environment for the F5 and GitLab REST-API.

The shell environment for the F5 and GitLab REST-API. - AxiansITSecurity/Restsh

GitHub