HomeVulnerabilityF5 releases BIG-IP patches for stolen security vulnerabilities

F5 releases BIG-IP patches for stolen security vulnerabilities

Cybersecurity firm F5 has launched security updates to deal with BIG-IP vulnerabilities stolen in a breach detected on August 9, 2025.

The corporate disclosed in a Wednesday submitting with the U.S. Securities and Alternate Fee (SEC) that state hackers breached its programs and stole supply code and data on undisclosed BIG-IP security flaws.

F5 added that there is no proof the risk actors leveraged the undisclosed vulnerabilities in assaults and mentioned it has not but discovered proof that the issues have been disclosed.

At this time, F5 has issued patches to deal with 44 vulnerabilities (together with those stolen within the breach) and urged clients to replace their programs as quickly as attainable. F5 confirmed to BleepingComputer that “right this moment’s security updates do handle influence from the incident.”

“Updates for BIG-IP, F5OS, BIG-IP Subsequent for Kubernetes, BIG-IQ, and APM purchasers can be found now. Although now we have no information of undisclosed important or distant code execution vulnerabilities, we strongly advise updating your BIG-IP software program as quickly as attainable,” the corporate mentioned.

See also  Palo Alto kauft CyberArk | CSO On-line

“We now have no proof of modification to our software program provide chain, together with our supply code and our construct and launch pipelines [..] and we aren’t conscious of lively exploitation of any undisclosed F5 vulnerabilities.”

F5 additionally issued steerage to assist safe F5 environments from cyberattacks, which they are saying contains the discharge of the October 2025 security updates. 

The corporate suggested admins to allow BIG-IP occasion streaming to their security data and occasion administration (SIEM) software program, configure distant syslog servers, and monitor for login makes an attempt to extend visibility and obtain alerts on admin logins, failed authentications, and privilege and configuration adjustments.

Federal companies ordered to deploy BIG-IP patches

On Wednesday, CISA revealed the ED 26-01 emergency directive, ordering Federal Civilian Govt Department (FCEB) companies to safe F5OS, BIG-IP TMOS, BIG-IQ, and BNK/CNF merchandise by putting in the newest F5 patches by October 22. For all different F5 {hardware} and software program home equipment on their networks, the deadline is prolonged to October 31.

See also  CISA Warns of Energetic Exploitation of Vital Vulnerability in iOS, iPadOS, and macOS

The U.S. cybersecurity company additionally instructed federal companies to disconnect and decommission all public-facing F5 gadgets which have reached end-of-support. 

“CISA is directing Federal Civilian Govt Department (FCEB) companies to stock F5 BIG-IP merchandise, consider if the networked administration interfaces are accessible from the general public web, and apply updates from F5,” CISA mentioned.

Profitable exploitation of susceptible BIG-IP home equipment can enable attackers to steal credentials and Utility Programming Interface (API) keys, transfer laterally inside targets’ networks, steal delicate knowledge, and set up persistence on compromised gadgets.

BIG-IP vulnerabilities are high-value targets for each nation-state and cybercrime risk teams, which have been exploiting them over time to map inside servers, stealthily steal knowledge, hijack gadgets on victims’ networks, push knowledge wipers, and breach company networks

F5 is a Fortune 500 tech big that gives cybersecurity, cloud administration, and utility supply networking (ADN) companies to over 23,000 clients worldwide and to 48 of Fortune 50 corporations.

See also  159 CVEs Exploited in Q1 2025 — 28.3% Inside 24 Hours of DisclosureApr 24, 2025Vulnerability / Risk Intelligence As many as 159 CVE identifiers have been flagged as exploited within the wild within the first quarter of 2025, up from 151 in This autumn 2024. "We proceed to see vulnerabilities being exploited at a quick tempo with 28.3% of vulnerabilities being exploited inside 1-day of their CVE disclosure," VulnCheck mentioned in a report shared with The Hacker Information. This interprets to 45 security flaws which have been weaponized in real-world assaults inside a day of disclosure. Fourteen different flaws have been exploited inside a month, whereas one other 45 flaws have been abused inside the span of a 12 months.  The cybersecurity firm mentioned a majority of the exploited vulnerabilities have been recognized in content material administration programs (CMSes), adopted by community edge gadgets, working programs, open-source software program, and server software program. The breakdown is as follows - Content material Administration Programs (CMS) (35) Community Edge Units (29) Working Programs (24) Open Supply Software program (14) Server Software program (14) The main ...

Picus BAS Summit

Be a part of the Breach and Attack Simulation Summit and expertise the way forward for security validation. Hear from high consultants and see how AI-powered BAS is reworking breach and assault simulation.

Do not miss the occasion that may form the way forward for your security technique

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular