CVE-2025-53868
F5 BIG-IP Virtual Edition vulnerability analysis and mitigation

Overview

CVE-2025-53868 is a security vulnerability affecting F5's BIG-IP products when running in Appliance mode. The vulnerability was disclosed on October 15, 2025, as part of F5's October 2025 Quarterly Security Notification. This vulnerability allows a highly privileged authenticated attacker with access to SCP and SFTP to bypass Appliance mode restrictions using undisclosed commands (CERT-EU, NVD).

Technical details

The vulnerability has been assigned a CVSS v4.0 base score of 8.5 (HIGH) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N. Additionally, it has a CVSS v3.1 base score of 8.7 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command Injection) (NVD).

Impact

If successfully exploited, this vulnerability could allow an attacker to bypass Appliance mode restrictions, potentially leading to unauthorized access and control of the system. The vulnerability affects confidentiality and integrity of the system, though availability is not impacted as indicated by the CVSS metrics (NVD).

Mitigation and workarounds

F5 has released patches to address this vulnerability as part of their October 2025 Quarterly Security Notification. Organizations are strongly urged to update their BIG-IP software as soon as possible. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also released emergency directive (ED) 26-01 recommending immediate patching of affected F5 devices (Tenable).

Community reactions

The vulnerability disclosure coincided with F5's announcement of a security breach by a nation-state threat actor. CISA has issued emergency directive ED 26-01 in response to the situation, highlighting the severity of the vulnerability and the need for immediate action (CERT-EU).

Additional resources


SourceThis report was generated using AI

Related F5 BIG-IP Virtual Edition vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61990HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-58071HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-61974HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-61951HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-60016HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management