URL has been copied successfully!
Frequently Asked Questions About The August 2025 F5 Security Incident
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Frequently asked questions about the August 2025 security incident at F5 and the release of multiple BIG-IP product patches.

Background

Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a recently disclosed security incident affecting F5. Alongside the disclosure of the security incident, F5 also released its October 2025 Quarterly Security Notification.

FAQ

What is the F5 Security Incident? Starting August 9, 2025, F5 learned that a nation-state threat actor gained and maintained access to certain systems within their environment. This included access to F5’s BIG-IP product development systems and “engineering knowledge management platforms.” On October 15, F5 released knowledge base (KB) article K000154696 providing current details on the known impacts of the breach, including an acknowledgement that they have not observed further unauthorized activity and believe they have successfully contained the breach. What data was stolen in this breach? According to F5, files from their BIG-IP engineering knowledge management systems and product development environments were accessed by the threat actor. The stolen data included details on undisclosed security vulnerabilities that were currently being investigated by F5 as well as source code for its BIG-IP product. What is the risk of undisclosed vulnerability data being stolen? With access to vulnerability reports and source code, the threat actor could use that information to develop exploits for issues that have not yet been patched or remediated. While F5 states they “have no knowledge of undisclosed critical or remote code vulnerabilities, and we are not aware of active exploitation of any undisclosed F5 vulnerabilities,” the risk remains that the attackers could use the stolen data to identify other vulnerabilities. Was any source code modified? Is there a risk of a supply-chain attack? According to F5, they have “no evidence of modification” to its supply chain, source code, including NGINX source code, build and release pipelines and the F5 Distributed Cloud Services or Silverline systems. These findings have reportedly been independently verified by two security research firms, NCC Group and IOActive. What are the vulnerabilities associated with the breach? At this time, F5 has not indicated that any vulnerabilities were exploited by the threat actor in order to gain access to their systems. However, on October 15, in conjunction with its security incident notice, F5 released several patches in KB article K000156572: Quarterly Security Notification (October 2025). While there is no notice in these security advisories that any of the CVEs have been exploited, we strongly recommend applying all available patches. Additionally, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released emergency directive (ED) 26-01: Mitigate Vulnerabilities in F5 Devices on October 15, which includes recommendations to apply all available updates. While the ED is aimed at Federal Civilian Executive Branch (FCEB) agencies, the guidance should be applicable to any organization with F5 devices or software in their environment. What actions should I take if my environment contains F5 software/devices? According to both F5 and the CISA ED, inventorying and updating all affected BIG-IP instances is of utmost importance. While it’s always recommended that security updates are applied quickly, in light of the breach, F5 urges “updating your BIG-IP software as soon as possible.” In addition, guidance from CISA suggests hardening any public facing BIG-IP devices and removing any unsupported devices from your network. Which threat actors are responsible for this attack? While no specific threat actor has been linked to the F5 breach, F5 says this incident involved a “highly sophisticated” nation-state threat actor. Are patches or mitigations available for the F5 October Quarterly Security Notification? Yes, F5 released its quarterly security notification for October 15, which includes fixes for the following products: BIG-IP (All Modules):

F5 KB Article Associated CVEs
K000151902 CVE-2025-53868
K000139514 CVE-2025-60016
K000150614 CVE-2025-48008
K000150637 CVE-2025-59781
K000151309 CVE-2025-61951
K000151611 CVE-2025-46706
K000156707 CVE-2025-53856
K000156733 CVE-2025-61974
K000156746 CVE-2025-58071
K000156912 CVE-2025-61990
K000156691 CVE-2025-58096
K000156642 CVE-2025-59481
K000154647 CVE-2025-61958
K000151308 CVE-2025-59269
K000151658 CVE-2025-58153
K000156800 CVE-2025-59483
K90301300 CVE-2025-59268
K000156801 CVE-2025-54755
K000151297 CVE-2025-58424

F5OS-A

F5 KB Article Associated CVEs
K000156767 CVE-2025-61955
K000156771 CVE-2025-57780
K000149820 CVE-2025-47150
K000156796 CVE-2025-60015
K000154661 CVE-2025-60013
K000148625 CVE-2025-53860

F5OS-C

F5 KB Article Associated CVEs
K000156767 CVE-2025-61955
K000156771 CVE-2025-57780
K000151718 CVE-2025-59778
K000149820 CVE-2025-47150
K000156796 CVE-2025-60015

BIG-IP Product Specific

Product F5 KB Article Associated CVEs
BIG-IP APM K000156741 K000156597 K000156602 K44517780 K000148816 K000156596 CVE-2025-53521 CVE-2025-61960 CVE-2025-54854 CVE-2025-53474 CVE-2025-47148 CVE-2025-61933
Advanced WAF/ASM K000156624 K000156621 K000154664 K000150752 K000148512 CVE-2025-61938 CVE-2025-54858 CVE-2025-61935 CVE-2025-55669 CVE-2025-58474
SSL Orchestrator K000150667 K000151368 K000148816 CVE-2025-41430 CVE-2025-55036 CVE-2025-47148
BIG-IP PEM K000151475 CVE-2025-54479
BIG-IP AFM K000152341 K000150010* CVE-2025-59478

*This KB article represents a BIG-IP AFM Security Exposure and is not associated with a CVE. BIG-IP Next

Product F5 KB Article Associated CVEs
BIG-IP Next SPK K000139514 K000150614 K000151611 K000156623 K000156733 K000156912 K000154614 K000151596 CVE-2025-60016 CVE-2025-48008 CVE-2025-46706 CVE-2025-58120 CVE-2025-61974 CVE-2025-61990 CVE-2025-55670 CVE-2025-54805
BIG-IP Next CNF K000139514 K000150614 K000150637 K000151475 K000151611 K000156623 K000156733 K000156746 K000156912 K000154614 K000151596 CVE-2025-60016 CVE-2025-48008 CVE-2025-59781 CVE-2025-54479 CVE-2025-46706 CVE-2025-58120 CVE-2025-61974 CVE-2025-58071 CVE-2025-61990 CVE-2025-55670 CVE-2025-54805
BIG-IP Next for Kubernetes K000151475 K000156623 K000156733 K000156746 K000156912 K000154614 K000151596 CVE-2025-54479 CVE-2025-58120 CVE-2025-61974 CVE-2025-58071 CVE-2025-61990 CVE-2025-55670 CVE-2025-54805

Other F5 Products

Product F5 KB Article Associated CVEs
NGINX App Protect WAF K000148512 CVE-2025-58474
F5 Silverline K000156733 K000151297 CVE-2025-61974 CVE-2025-58424

Has Tenable released any product coverage for these vulnerabilities? A list of Tenable plugins for these vulnerabilities can be found on the individual CVE pages as they’re released: CVE-2025-53868 CVE-2025-60016 CVE-2025-48008 CVE-2025-59781 CVE-2025-61951 CVE-2025-46706 CVE-2025-53856 CVE-2025-61974 CVE-2025-58071 CVE-2025-61990 CVE-2025-58096 CVE-2025-59481 CVE-2025-61958 CVE-2025-59269 CVE-2025-58153 CVE-2025-59483 CVE-2025-59268 CVE-2025-54755 CVE-2025-58424 CVE-2025-61955 CVE-2025-57780 CVE-2025-47150 CVE-2025-60015 CVE-2025-60013 CVE-2025-53860 CVE-2025-59778 CVE-2025-53521 CVE-2025-61960 CVE-2025-54854 CVE-2025-53474 CVE-2025-47148 CVE-2025-61933 CVE-2025-61938 CVE-2025-54858 CVE-2025-61935 CVE-2025-55669 CVE-2025-58474 CVE-2025-41430 CVE-2025-55036 CVE-2025-54479 CVE-2025-59478 CVE-2025-58120 CVE-2025-55670 CVE-2025-54805 This link will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.

Get more information

F5: K000154696: F5 Security Incident F5: K000156572: Quarterly Security Notification (October 2025) CISA: ED 26-01: Mitigate Vulnerabilities in F5 Devices Join Tenable’s Research Special Operations (RSO) Team on Tenable Connect and engage with us in the Threat Roundtable group for further discussions on the latest cyber threats. Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.

First seen on securityboulevard.com

Jump to article: securityboulevard.com/2025/10/frequently-asked-questions-about-the-august-2025-f5-security-incident/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link