Skip to content
Remote Code Execution
Concept

Remote Code Execution

RCE: vulnerability class enabling an attacker to execute arbitrary code on a remote system; present in CitrixBleed 3, F5 BIG-IP APM, and the 17-year-old Office CVE.

Last refreshed: 17 April 2026

Key Question

Why does a vulnerability going from 'denial of service' to 'remote code execution' matter so much?

Timeline for Remote Code Execution

#117 Apr

Mentioned in: F5 reclassifies DoS bug to 9.8 RCE

Cybersecurity: Threats and Defences
View full timeline →
Common Questions
What is remote code execution and why is it so dangerous?
Remote Code Execution (RCE) is a vulnerability class that lets an attacker run arbitrary commands on a target system over the network without physical access. Unauthenticated RCE requires no prior login, making it the highest-severity vulnerability category.Source: NIST / CISA
Why was the F5 vulnerability reclassified from low risk to critical?
CVE-2025-53521 in F5 BIG-IP APM was initially rated medium-severity DoS. F5 reclassified it to unauthenticated RCE with CVSS 9.8 in March 2026 after active exploitation evidence changed the assessed attack class; CISA added it to KEV simultaneously.Source: F5 / CISA

Background

Remote Code Execution (RCE) vulnerabilities featured in three of the most critical disclosures in this update. CVE-2026-3055 (CitrixBleed 3) enables unauthenticated memory overread in NetScaler's SAML path ; CVE-2025-53521 was reclassified from a medium-severity DoS to unauthenticated RCE with CVSS 9.8 in F5 BIG-IP APM ; and CVE-2009-0238, a 17-year-old Microsoft Office RCE, was added to CISA's KEV catalogue as actively exploited in March 2026.

RCE vulnerabilities allow an attacker to run arbitrary commands or code on a target system without physical access. They are the highest-impact category of software vulnerability because successful exploitation provides a foothold equivalent to interactive access on the compromised system. Unauthenticated RCE, where no prior credential or session is required, is the most severe subclass.

The F5 reclassification from DoS to RCE in this update is the operational lesson in patch-triage discipline: an organisation that triaged CVE-2025-53521 as a medium-priority DoS bug and deferred patching was, after reclassification, exposed to unauthenticated code execution on its internet-facing authentication gateway. The CVE classification system provides only point-in-time assessments; exploitation class can change after initial advisory.