New! Try the FREE Predictive Security Plugin for WordPress – Scan, Secure & Stay Safe in Seconds!

Current CyberSecurity Advisories

Confirmed compromise of F5 network

Release date
15 October 2025
Alert rating
HIGH

Description

The NCSC is advising organisations to follow the guidance issued by F5 and to install the latest security updates.

Audience

Public sectorCyber security professionals

Current update

F5 has issued a statement  reporting a compromise of its systems, and data exfiltration. This data is reported to include a portion of its BIG-IP source code and vulnerability information.

This access could enable a threat actor to:

  • exploit F5 devices and software
  • conduct static and dynamic analysis for identification of logical flaws and vulnerabilities as well as the ability to develop targeted exploits

Successful exploitation of the impacted F5 products could enable a threat actor to access embedded credentials and Application Programming Interface (API) keys, move laterally within an organisation’s network, exfiltrate data, and establish persistent system access.

There is currently no indication that any customer networks have been impacted via the compromise of the F5 network.

While there is currently no suggestion that nginx has been affected, instances should always be updated to a latest version as per NCSC vulnerability management guidance.

Affected F5 products:

  • Hardware: BIG-IP iSeries, rSeries, or any other F5 device that has reached end of support
  • Software: All devices running BIG-IP (F5OS), BIG-IP (TMOS), Virtual Edition (VE), BIG IP Next, BIG- IQ, and BIG-IP Next for Kubernetes (BNK) / Cloud-Native Network Functions (CNF)

If you use F5 products, you should take the following priority actions:

  1. Identify all F5 products (hardware, software and virtualised).
  2. Management interfaces should not be exposed to the internet. If an exposed management interface is found, a compromise assessment should be undertaken.
  3. If you believe you have been compromised, you should contact F5 SIRT and, if you are in the UK, also report it to the NCSC.
  4. Follow vendor best practice advice in Hardening your F5 system.
  5. Install the latest F5 security updates.
  6. Replace any product that have reached end of support or follow NCSC’s obsolete products guidance.
  7. Perform continuous network monitoring and threat hunting.

The NCSC provides a range of free guidance, services and tools that help to secure systems.

Protect your assets with Predictive

TisaAssist bot
🤖 Hello, how can I assist you today?
I can help you with:
✅ Answer questions related to the website.
✅ Help you understand things you don't know.
❓ What's Tisalabs
💻 What's IoT
🔒 Why sensor data must be protected?