Wednesday, October 15, 2025

HomeCyberSecurityF5 releases BIG-IP patches for stolen security vulnerabilities

F5 releases BIG-IP patches for stolen security vulnerabilities

F5

Cybersecurity company F5 has released security updates to address BIG-IP vulnerabilities stolen in a breach detected on August 9, 2025.

The company disclosed in a Wednesday filing with the U.S. Securities and Exchange Commission (SEC) that state hackers breached its systems and stole source code and information on undisclosed BIG-IP security flaws.

F5 added that there’s no evidence the threat actors leveraged the undisclosed vulnerabilities in attacks and said it has not yet found evidence that the flaws have been disclosed.

Today, F5 has issued patches to address 44 vulnerabilities (including the ones stolen in the breach) and urged customers to update their systems as soon as possible. F5 confirmed to BleepingComputer that “today’s security updates do address impact from the incident.”

“Updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients are available now. Though we have no knowledge of undisclosed critical or remote code execution vulnerabilities, we strongly advise updating your BIG-IP software as soon as possible,” the company said.

“We have no evidence of modification to our software supply chain, including our source code and our build and release pipelines [..] and we are not aware of active exploitation of any undisclosed F5 vulnerabilities.”

F5 also issued guidance to help secure F5 environments from cyberattacks, which they say includes the release of the October 2025 security updates. 

The company advised admins to enable BIG-IP event streaming to their security information and event management (SIEM) software, configure remote syslog servers, and monitor for login attempts to increase visibility and receive alerts on admin logins, failed authentications, and privilege and configuration changes.

Federal agencies ordered to deploy BIG-IP patches

On Wednesday, CISA published the ED 26-01 emergency directive, ordering Federal Civilian Executive Branch (FCEB) agencies to secure F5 hardware and software appliances by applying the latest security updates by October 31, 2025.

The U.S. cybersecurity agency also instructed federal agencies to disconnect and decommission all public-facing F5 devices that have reached end-of-support. 

“CISA is directing Federal Civilian Executive Branch (FCEB) agencies to inventory F5 BIG-IP products, evaluate if the networked management interfaces are accessible from the public internet, and apply updates from F5,” CISA said.

Successful exploitation of vulnerable BIG-IP appliances can allow attackers to steal credentials and Application Programming Interface (API) keys, move laterally within targets’ networks, steal sensitive data, and establish persistence on compromised devices.

BIG-IP vulnerabilities are high-value targets for both nation-state and cybercrime threat groups, which have been exploiting them over the years to map internal servers, stealthily steal data, hijack devices on victims’ networks, push data wipers, and breach corporate networks

F5 is a Fortune 500 tech giant that provides cybersecurity, cloud management, and application delivery networking (ADN) services to over 23,000 customers worldwide and to 48 of Fortune 50 companies.

Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

Don’t miss the event that will shape the future of your security strategy


Source link

Bookmark (0)
Please login to bookmark Close
RELATED ARTICLES
- Advertisment -spot_img

Most Popular

Sponsored Business

- Advertisment -spot_img