F5: Attacker Accessed BIG-IP Source Code, Bug Data
The company discovered the intrusion in August but did not say when the attackers first gained access to F5’s systems or how long they had access.

The company discovered the intrusion in August but did not say when the attackers first gained access to F5’s systems or how long they had access.
October 17, 2025 | 2 min read

F5 has disclosed a serious security incident in which a nation-state threat actor gained access to, and downloaded files from, some key F5 systems, including the company's BIG-IP product development environment and engineering knowledge management platforms.
The company discovered the intrusion in August but did not say when the attackers first gained access to F5’s systems or how long they had access, only that it was “long-term, persistent access”. Among the information the attackers accessed was data about private vulnerabilities in BIG-IP, F5’s app delivery and security platform. BIG-IP is a very widely used enterprise platform that’s used across many industries.
“We have confirmed that the threat actor exfiltrated files from our BIG-IP product development environment and engineering knowledge management platforms. These files contained some of our BIG-IP source code and information about undisclosed vulnerabilities we were working on in BIG-IP. We have no knowledge of undisclosed critical or remote code vulnerabilities, and we are not aware of active exploitation of any undisclosed F5 vulnerabilities,” the company said in a statement on Oct. 15.
CISA has issued an emergency directive regarding the F5 incident, too.
F5 said there is no evidence that the attackers stole data from the company’s CRM or financial systems, but “some of the exfiltrated files from our knowledge management platform contained configuration or implementation information for a small percentage of customers.”
The company has filed an 8-K with the Securities and Exchange Commission about the incident, as well, and said that the intrusion has not had a material impact on F5’s operations as of yet.
“The Company believes its containment actions have been successful and, since the initiation of its containment efforts, has not observed any evidence of new unauthorized activity. The investigation, monitoring, and related activities are ongoing,” the SEC filing says.
In a separate advisory, F5 also said that it has rotated the signing certificates and keys used to sign F5 digital objects.
What Happened
What To Do Now
F5 has released updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients. The company strongly advises customers to update to these new releases as soon as possible.
October 17, 2025 | 2 min read
Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.