Particle.news

Download on the App Store

CISA Orders Urgent Patching After F5 Confirms Nation-State Breach of BIG-IP Code

The federal order reflects concern that stolen vulnerability details could enable intrusions into widely deployed F5 devices across government networks.

Overview

  • Emergency Directive 26-01 requires federal agencies to inventory F5 gear, apply fixes to core products by October 22 and other devices by October 31, and disconnect end-of-support systems.
  • F5 released updates addressing 44 vulnerabilities across BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ and APM clients, urging immediate installation.
  • Investigators say the intruder maintained long-term access to BIG-IP development and engineering systems and exfiltrated source code, undisclosed vulnerability data and some customer configuration details.
  • F5 and external firms CrowdStrike, Mandiant, NCC Group and IOActive report no evidence of software supply-chain tampering or active exploitation, and F5 says containment remains effective.
  • The Justice Department approved a temporary disclosure delay in September for national-security reasons, and F5 is contacting affected customers as reviews and notifications proceed.