Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Cybersecurity

F5 BIG-IP Systems Under Active Attack as CISA Flags Critical Zero-Day

29 March 2026 · 3 min read

← All insights

CISA added CVE-2025-53521 to its Known Exploited Vulnerabilities catalog on 27 March, giving federal agencies just three days to patch this F5 BIG-IP Application Policy Manager flaw before the 30 March deadline passes. The vulnerability affects F5 BIG-IP systems, which are enterprise-grade load balancers and application delivery controllers used to manage and secure network traffic across critical infrastructure.

Originally dismissed as a denial-of-service issue when disclosed in February, security researchers reclassified the flaw as remote code execution after discovering active exploitation campaigns throughout March 2026. According to reporting from Help Net Security, attackers are leveraging the vulnerability to gain complete system control over unpatched BIG-IP deployments.

Key Facts:
- CVE-2025-53521 enables remote code execution on F5 BIG-IP APM systems without authentication
- CISA classified the vulnerability as actively exploited, triggering emergency federal patching requirements
- The flaw was initially categorised as denial-of-service before researchers confirmed RCE capabilities
- F5 released patches in February, but many enterprise deployments remain unpatched

What Makes This Different From Recent Enterprise Attacks?

Unlike recent supply chain compromises targeting development tools, this vulnerability sits at the perimeter of enterprise networks. F5 BIG-IP systems typically handle incoming traffic before it reaches internal systems, making successful exploitation a gateway to broader network compromise. The NCSC's guidance on perimeter security emphasises that load balancer compromises often provide attackers with privileged network positions that bypass traditional monitoring.

The timing mirrors other critical infrastructure targeting seen across UK networks this year, suggesting coordinated efforts to exploit enterprise networking equipment before patches are deployed.

Boardroom Questions

Quick Diagnostic

PTG Intelligence Desk
Pacific Technology Group

Related Reading

Oracle's Critical RCE Flaw Leaves UK Enterprises Exposed to Instant System Takeover — Oracle's emergency patch for CVE-2026-21992 addresses unauthenticated remote code execution in Identity Manager, mirrori

Critical Oracle Identity Manager Zero-Day Leaves UK Enterprises Exposed to Unauthenticated Takeover — Oracle's emergency patch for CVE-2026-21992 addresses critical 9.8 CVSS vulnerability in Identity Manager allowing unaut

TeamPCP's Audio Steganography Attack Hides Malware Inside 740K-Download Python Package — Supply chain attackers compromised the Telnyx PyPI package, embedding credential stealers inside WAV audio files to evad

UK Enterprises Face Third CitrixBleed-Style Attack as Memory Leak Flaw Threatens SAML Deployments — Critical CVE-2026-3055 vulnerability enables unauthenticated attackers to extract sensitive data from Citrix NetScaler S

Four Weekly Cyber Attacks Now Hit UK Critical Infrastructure as Defence Gap Widens — NCSC data reveals UK faces four nationally significant cyber attacks weekly - a 129% increase from 2024, with manufactur

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch