Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessHSBC Report: Market Systematically Underestimates Alibaba and Tencent's AI Monetization Capabilities - MoomooGoogle News - Tencent AII Stress-Tested PAIO for OpenClaw: Faster Setup, Lower Token Use, Better Security?DEV CommunitySources: AI startup Poolside held talks with Google and others to revive a Texas data center project after a CoreWeave deal and a $2B Nvidia-led round collapsed (Stephen Morris/Financial Times)TechmemeOutSystems Introduces Agentic Systems Engineering to Power Governed, Open Enterprise AI - Thailand Business NewsGoogle News - AI ThailandSystematically dismantle the AI compute supply chain.LessWrong AI🚀 I Built an API Documentation Generator That Works in 5 SecondsDEV CommunitySum, Count, and Reverse of Digits in Python (While Loop & Recursion)DEV CommunityWhen LangChain Is Enough: How to Build Useful AI Apps Without OverengineeringDEV CommunityGoogle's $20 per month AI Pro plan just got a big storage boostEngadgetThe Evolution of Natural Language Processing: A Journey from 1960 to 2020DEV CommunityApple Just Killed a $100M Vibe Coding App. Here's the Security Angle Nobody's Talking About.DEV CommunitySamsung SDS Unveils AI, Digital Twin Logistics Innovations at 2026 Conference - 조선일보GNews AI SamsungBlack Hat USADark ReadingBlack Hat AsiaAI BusinessHSBC Report: Market Systematically Underestimates Alibaba and Tencent's AI Monetization Capabilities - MoomooGoogle News - Tencent AII Stress-Tested PAIO for OpenClaw: Faster Setup, Lower Token Use, Better Security?DEV CommunitySources: AI startup Poolside held talks with Google and others to revive a Texas data center project after a CoreWeave deal and a $2B Nvidia-led round collapsed (Stephen Morris/Financial Times)TechmemeOutSystems Introduces Agentic Systems Engineering to Power Governed, Open Enterprise AI - Thailand Business NewsGoogle News - AI ThailandSystematically dismantle the AI compute supply chain.LessWrong AI🚀 I Built an API Documentation Generator That Works in 5 SecondsDEV CommunitySum, Count, and Reverse of Digits in Python (While Loop & Recursion)DEV CommunityWhen LangChain Is Enough: How to Build Useful AI Apps Without OverengineeringDEV CommunityGoogle's $20 per month AI Pro plan just got a big storage boostEngadgetThe Evolution of Natural Language Processing: A Journey from 1960 to 2020DEV CommunityApple Just Killed a $100M Vibe Coding App. Here's the Security Angle Nobody's Talking About.DEV CommunitySamsung SDS Unveils AI, Digital Twin Logistics Innovations at 2026 Conference - 조선일보GNews AI Samsung

NCSC Issues Ugent Patch Notice of F5 BIG-IP Vulnerability

Digit.fyiby elizabethApril 1, 20261 min read0 views
Source Quiz

The NCSC is encouraging UK organisations to take immediate action to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Policy Manager (CVE-2025-53521). F5 BIG-IP APM is a common component, especially within large enterprises. F5 has published an updated security advisory explaining that a previously disclosed vulnerability in BIG-IP APM has been recategorised as an […] The post NCSC Issues Ugent Patch Notice of F5 BIG-IP Vulnerability appeared first on DIGIT .

The NCSC is encouraging UK organisations to take immediate action to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Policy Manager (CVE-2025-53521).

F5 BIG-IP APM is a common component, especially within large enterprises.

F5 has published an updated security advisory explaining that a previously disclosed vulnerability in BIG-IP APM has been recategorised as an unauthenticated remote code execution vulnerability

When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).

F5 is aware of active exploitation of CVE-2025-53521 affecting BIG-IP APM.

The NCSC is working to fully understand UK impact and any potential cases of active exploitation affecting UK networks.

The NCSC recommends investigating for compromise on all affected products regardless of when the system was updated. F5 have published Indicators of Compromise.

All organisations using BIG-IP APM are affected by this vulnerability.

Recommended reading

  • Report: Vulnerability Exploitation Surge Endangers Cybersecurity

  • Microsoft Issues Critical Patches as Threat Actors Hit SharePoint

  • Half of SMEs Struggle to Keep Up With Security Threats

  • 1 in 4 SMEs Find Remote Working A Key Cybersecurity Concern

The NCSC recommends following vendor best-practice advice to mitigate vulnerabilities. In this case due to reports of in the wild exploitation, if you use an affected product, you should take these priority actions:

  • Read the security advisory and Indicators of Compromise.

  • If possible, isolate the affected system(s) and replace with a new, fully up-to-date system (NOTE: this may cause service outage).

  • Fully investigate for evidence of compromise following the vendor guidance (an assured Cyber Incident Response provider can assist). Where this isn’t possible; the affected system should be erased/destroyed and rebuilt as new.

  • If you believe you have been compromised, and are in the UK, you should report it and consider using an assured Cyber Incident Response provider. You can also report the compromise to the vendor to assist their investigation.

  • Update to the latest version of the affected product.

  • Apply any appropriate security hardening.

  • Re-enable/reintroduce the affected system(s).

  • Perform continuous threat hunting activities.

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

updatepolicycomponent

Knowledge Map

Knowledge Map
TopicsEntitiesSource
NCSC Issues…updatepolicycomponentpublishedDigit.fyi

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 259 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Releases