October 16 Advisory: Nation-State Breach of F5 Networks — Exposure of BIG-IP Source Code & Undisclosed Vulnerabilities

Rapid Response

Vulnerability Description

F5 Networks disclosed a major supply-chain breach in which a suspected nation-state threat actor gained persistent access to internal engineering and development environments.

The intrusion resulted in the theft of BIG-IP source code, internal vulnerability research, and limited customer configuration data. While F5 reports no impact to core operations or software integrity, the potential exposure of undisclosed vulnerabilities poses elevated risk to all BIG-IP customers. 

Within hours of disclosure, CISA issued Emergency Directive ED-26-01, ordering federal agencies to mitigate or disconnect affected F5 devices due to potential downstream compromise. The directive instructs agencies to prioritize updates for F5OS, BIG‑IP TMOS, BIG‑IQ, and BNK/CNF.

F5 has released updated software to address CVEs in several of its products in response. While F5 has stated that there is no current evidence of undisclosed critical or remote code execution vulnerabilities being leveraged in attacks, customers are strongly encouraged to install these updates as a precaution.

FieldDescription
VendorF5 Networks
Products AffectedBIG-IP product family (including TMUI, iControl REST, APM, API, and management interfaces)Note that NGINX, Distributed Cloud, and Silverline are not affected.
Date of DisclosureOctober 15, 2025
Threat ActorSuspected nation-state group (undisclosed attribution)
Incident TypeSupply-chain intrusion / source-code and vulnerability data exfiltration
ImpactExposure of BIG-IP source code and internal flaw data; potential for future zero-day exploitation; limited customer configuration leakage
Initial AccessCompromise of internal development and knowledge-management systems (exact vector under investigation) first detected on August 9, 2025
Exploitation StatusNo confirmed customer exploitation as of publication, but CISA warns of high likelihood of weaponization

Censys Perspective 

Censys has identified 681,308 internet-facing F5 BIG-IP devices across the globe, including load balancers, application gateways, and management interfaces. While we cannot confirm which instances are vulnerable, this scan data provides a clear picture of the widespread global exposure of F5 BIG-IP infrastructure.

Screenshot-2025-10-16-at-10.23.15-AM.png
Map of potentially affected assets

See the full breakdown by country in Censys Platform –> 

Over 90% of the observed systems appear to be running BIG-IP Local Traffic Manager (LTM) or Access Policy Manager (APM). A smaller portion includes Application Security Manager (ASM)Advanced WAF, and the BIG-IP Configuration Utility.

BIG-IP Configuration Utility is the web-based admin interface used to manage and configure BIG-IP systems, including access to TMUI and other core components. The other products—LTM, APM, ASM, and Advanced WAF—are functional modules that provide traffic management, access control, and security features but are not admin interfaces themselves.

Although details about the exposed vulnerabilities remain limited, F5 reports no evidence that the stolen information has been used in active attacks or that any private data has been publicly disclosed. The company is continuing its investigation and will notify customers whose configuration or implementation data may have been accessed.

Still as a precautionary measure, it’s recommended that defenders inventory all F5 / BIG-IP assets (hardware, virtual, and cloud) and restrict management interfaces (TMUI, iControl REST, APM, API) from untrusted networks. 

The queries below can help identify F5 BIG-IP instances, but they cannot determine if systems are vulnerable. Organizations must verify patch status independently.

Censys Platform Query:

host.services.software: (vendor: “f5″ and (product:”big-ip” or product=”ip_configuration_utility” )) and not host.services.labels.value = “HONEYPOT” and not host.services.representative_info: *

Censys Legacy Search Query:

services.software: (vendor:”f5″ and (product:”big-ip” or product=”IP Configuration Utility”)) and not labels:{`honeypot`, `tarpit`}

Censys ASM Query:

host.services.software: (vendor:”f5″ and (product:”big-ip” or product=”IP Configuration Utility”)) and not host.labels:{`honeypot`, `tarpit`}

References

Subscribe to our blog