Overview
- Emergency Directive 26-01 requires federal agencies to inventory F5 gear, apply fixes to core products by October 22 and other devices by October 31, and disconnect end-of-support systems.
- F5 released updates addressing 44 vulnerabilities across BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ and APM clients, urging immediate installation.
- Investigators say the intruder maintained long-term access to BIG-IP development and engineering systems and exfiltrated source code, undisclosed vulnerability data and some customer configuration details.
- F5 and external firms CrowdStrike, Mandiant, NCC Group and IOActive report no evidence of software supply-chain tampering or active exploitation, and F5 says containment remains effective.
- The Justice Department approved a temporary disclosure delay in September for national-security reasons, and F5 is contacting affected customers as reviews and notifications proceed.