F5 releases BIG-IP patches for stolen security vulnerabilities
好,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求是直接写描述,不需要开头用“文章内容总结”之类的。 首先,我得仔细阅读文章内容。文章主要讲的是F5公司发现了一个安全漏洞,被黑客入侵,窃取了源代码和未公开的安全漏洞信息。然后F5发布了补丁来修复这些漏洞,并敦促客户尽快更新系统。此外,美国的CISA机构也发布了紧急指令,要求联邦机构安装这些补丁,并在截止日期前完成。 接下来,我需要提取关键信息:F5发现漏洞、黑客入侵、发布补丁、客户更新、CISA指令、截止日期等。 然后,我要把这些信息浓缩到100字以内。要确保涵盖主要事件和影响,比如漏洞被利用的风险和修复措施。 最后,组织语言,确保简洁明了。可能的结构是:F5发现漏洞被窃取,发布补丁修复44个漏洞,并敦促客户更新;CISA要求联邦机构安装补丁,并给出截止日期。 这样应该能准确传达文章的核心内容。 </think> F5 发布安全更新修复 BIG-IP 漏洞,此前遭黑客入侵窃取源代码及未公开漏洞信息。公司称未发现漏洞被利用或泄露,并敦促客户尽快更新系统以应对潜在风险。 2025-10-15 18:15:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:10 收藏

F5

Cybersecurity company F5 has released security updates to address BIG-IP vulnerabilities stolen in a breach detected on August 9, 2025.

The company disclosed in a Wednesday filing with the U.S. Securities and Exchange Commission (SEC) that state hackers breached its systems and stole source code and information on undisclosed BIG-IP security flaws.

F5 added that there's no evidence the threat actors leveraged the undisclosed vulnerabilities in attacks and said it has not yet found evidence that the flaws have been disclosed.

Today, F5 has issued patches to address 44 vulnerabilities (including the ones stolen in the breach) and urged customers to update their systems as soon as possible. F5 confirmed to BleepingComputer that "today's security updates do address impact from the incident."

"Updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients are available now. Though we have no knowledge of undisclosed critical or remote code execution vulnerabilities, we strongly advise updating your BIG-IP software as soon as possible," the company said.

"We have no evidence of modification to our software supply chain, including our source code and our build and release pipelines [..] and we are not aware of active exploitation of any undisclosed F5 vulnerabilities."

F5 also issued guidance to help secure F5 environments from cyberattacks, which they say includes the release of the October 2025 security updates. 

The company advised admins to enable BIG-IP event streaming to their security information and event management (SIEM) software, configure remote syslog servers, and monitor for login attempts to increase visibility and receive alerts on admin logins, failed authentications, and privilege and configuration changes.

Federal agencies ordered to deploy BIG-IP patches

On Wednesday, CISA published the ED 26-01 emergency directive, ordering Federal Civilian Executive Branch (FCEB) agencies to secure F5OS, BIG-IP TMOS, BIG-IQ, and BNK/CNF products by installing the latest F5 patches by October 22. For all other F5 hardware and software appliances on their networks, the deadline is extended to October 31.

The U.S. cybersecurity agency also instructed federal agencies to disconnect and decommission all public-facing F5 devices that have reached end-of-support. 

"CISA is directing Federal Civilian Executive Branch (FCEB) agencies to inventory F5 BIG-IP products, evaluate if the networked management interfaces are accessible from the public internet, and apply updates from F5," CISA said.

Successful exploitation of vulnerable BIG-IP appliances can allow attackers to steal credentials and Application Programming Interface (API) keys, move laterally within targets' networks, steal sensitive data, and establish persistence on compromised devices.

BIG-IP vulnerabilities are high-value targets for both nation-state and cybercrime threat groups, which have been exploiting them over the years to map internal servers, stealthily steal data, hijack devices on victims' networks, push data wipers, and breach corporate networks

F5 is a Fortune 500 tech giant that provides cybersecurity, cloud management, and application delivery networking (ADN) services to over 23,000 customers worldwide and to 48 of Fortune 50 companies.

Picus BAS Summit

The Security Validation Event of the Year: The Picus BAS Summit

Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

Don't miss the event that will shape the future of your security strategy


文章来源: https://www.bleepingcomputer.com/news/security/f5-releases-big-ip-patches-for-stolen-security-vulnerabilities/
如有侵权请联系:admin#unsafe.sh