F5 reclassified CVE-2025-53521 in its BIG-IP Access Policy Manager (APM) on 28 March 2026 from a medium-severity denial-of-service (DoS) bug to an unauthenticated Remote Code Execution (RCE) vulnerability with a Common Vulnerability Scoring System (CVSS) v3.1 score of 9.8 1. BIG-IP APM is the module in F5's load-balancer line that handles identity-aware remote access, so exploitation gives the attacker code execution on the box sitting between the public internet and an organisation's internal applications. F5 simultaneously confirmed memory-only web shells were being deployed in the wild.
The Cybersecurity and Infrastructure Security Agency (CISA) placed the bug in its Known Exploited Vulnerabilities (KEV) catalogue on the same day, and the UK National Cyber Security Centre (NCSC) issued an advisory on 30 March urging UK operators to patch immediately. Data from Shadowserver, the Netherlands-based security research foundation that scans the public internet for exposed assets, showed more than 14,000 BIG-IP APM instances still unpatched at the point of reclassification despite F5 having released the fix months earlier.
Severity reclassification after patch is the structural problem the enterprise triage model was not built to handle. Most vulnerability-management programmes rank patches against the initial CVSS score, slot the work into a priority queue, and do not revisit the score once the patch is scheduled. An organisation that triaged the original DoS rating as a lower-tier issue and deferred the patch to the next maintenance window was, in effect, patched into the wrong queue by F5's own first call. For the CISOs running appliance-heavy edge estates, the lesson is blunter than the advisory: reclassification history now has to be a formal input to patch scheduling, because the vendor can move a bug from yellow to red after the board has already signed off the quarter's cyber plan.
