Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Phantom Project Bundles Infostealer, Crypter and RAT For Sale

April 1, 2026

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

April 1, 2026

Maryland Man Charged Over $53m Uranium Finance Crypto Hack

April 1, 2026
Facebook X (Twitter) Instagram
Wednesday, April 1
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»NCSC Urges Immediate Patching of F5 BIG-IP Bug
News

NCSC Urges Immediate Patching of F5 BIG-IP Bug

Team-CWDBy Team-CWDMarch 31, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


UK organizations have been encouraged to immediately patch a critical new vulnerability in F5’s BIG-IP Access Policy Manager (APM) product currently under active exploitation.

The National Cyber Security Centre (NCSC) explained that it is still “working to fully understand UK impact and any potential cases of active exploitation affecting UK networks.”

It added that CVE-2025-53521 could lead to remote code execution (RCE) “when a BIG-IP APM access policy is configured on a virtual server.”

In a security advisory, F5 explained that the flaw was originally classified as a denial-of-service vulnerability with a CVSS score of 7.5. However, “due to new information obtained in March 2026” the CVE is being re-categorized as an RCE flaw with a score of 9.8.

Read more on F5 vulnerabilities: Firms Urged to Patch as Attackers Exploit Critical F5 Bugs

The US Cybersecurity and Infrastructure Security Agency (CISA) added the CVE to its Known Exploited Vulnerabilities (KEV) catalog and gave federal agencies up to midnight on March 30 to patch – reflecting the seriousness of the bug.

“This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,” it said.

F5 urged customers to consult their corporate security policy for incident handling guidelines including forensic best practices, in the event of compromise.

“More specifically, review the policies to ensure that they comply with evidence collection and forensics procedures for a security incident before you attempt to recover the system,” it added.

“Additionally, if you do not know exactly when the system was compromised, your UCS [user configuration set] backups may have been created afterward, or both, F5 strongly recommends that you rebuild the configuration from scratch because UCS files from compromised systems can contain persistent malware.”

What F5 Customers Should Do Next

The NCSC recommended F5 customers do the following:

  • Read F5’s security advisory and Indicators of Compromise
  • Isolate affected systems where possible and replace with a new, fully updated system – although this may cause a service outage
  • Fully investigate for evidence of compromise in line with F5 guidance. If this isn’t possible, the affected system should be “erased/destroyed and rebuilt as new”
  • Report any incidents of compromise to the NCSC 
  • Update to the latest version of the product
  • Apply appropriate security hardening
  • Re-enable/reintroduce the affected system(s)
  • Perform continuous threat hunting  

F5 products are popular targets for sophisticated threat actors, including nation states.

Last October the tech vendor revealed that a state-backed group had achieved “long-term, persistent access” to its own systems, stealing source code and undisclosed information about vulnerabilities in its products.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
Next Article We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them
Team-CWD
  • Website

Related Posts

News

Phantom Project Bundles Infostealer, Crypter and RAT For Sale

April 1, 2026
News

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

April 1, 2026
News

Employee Data Breaches Surge to Seven-Year High

March 31, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.