Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks

Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability.

BleepingComputer

📰 F5 BIG-IP Flaw Escalated to Critical 9.8 RCE, Now Under Active Attack

🚨 CRITICAL: F5 reclassifies a BIG-IP flaw (CVE-2025-53521) to a 9.8 CVSS RCE, and it's being actively exploited! Unauthenticated attackers can gain root access. CISA added to KEV. Patch NOW! 🔥 #F5 #BIGIP #CVE #RCE #CyberSecurity

🔗 https://cyber.netsecops.io/articles/critical-f5-big-ip-vulnerability-cve-2025-53521-reclassified-and-exploited/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

F5 BIG-IP Flaw Escalated to Critical 9.8 RCE, Now Under Active Attack

A 5-month-old F5 BIG-IP vulnerability, CVE-2025-53521, has been reclassified as a critical 9.8 CVSS RCE and is under active exploitation. CISA has added it to the KEV catalog. Patch immediately.

CyberNetSec.io
Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices.

BleepingComputer

I’m curious how many of you are actively evaluating an exit strategy from #F5 #BigIP, now that it’s clear these appliances have been #compromised to a degree that makes long-term trust questionable. Are you already testing replacements, or at least mapping out contingency plans? And if so, which platforms are emerging as viable alternatives?

From what I’m seeing, teams are weighing several directions — anything from #HAProxy, #NGINX/#OpenResty, or Envoy-based solutions, to #cloudnative forms and #opensource service meshes. None is a drop-in replacement, but each represents a different set of tradeoffs depending on how much control, transparency, and verifiability you want going forward.
#loadbalancer #security #cybersecurity

"F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations."

https://www.schneier.com/blog/archives/2025/10/serious-f5-breach.html

#BIGIP #CloudServices #LoadBalancing #F5

Serious F5 Breach - Schneier on Security

This is bad: F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long-term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years. During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 ...

Schneier on Security
🚨 F5 breach (CRITICAL): Nation-state accessed BIG-IP dev systems — exfiltrated source, 0-day info, and configs. No active exploits yet, but risk is high. Monitor, segment, and patch ASAP when available. Details: https://radar.offseq.com/threat/f5-data-breach-what-happened-and-how-it-impacts-yo-8c427a49 #OffSeq #BIGIP #CyberThreat #Infosec
myF5

#Breach of #F5 requires “emergency action” from BIG-IP users, feds warn

Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state #hacking group following the breach of a major maker of software, the federal government warned Wednesday.
#BIGIP #security

https://arstechnica.com/security/2025/10/breach-of-f5-requires-emergency-action-from-big-ip-users-feds-warn/

Thousands of customers imperiled after nation-state ransacks F5’s network

Risks to BIG-IP users include supply-chain attacks, credential loss, and vulnerability exploits.

Ars Technica
F5 Says Hackers Stole Undisclosed BIG-IP Flaws, Source Code - Slashdot

An anonymous reader quotes a report from BleepingComputer: U.S. cybersecurity company F5 disclosed that nation-state hackers breached its systems and stole undisclosed BIG-IP security vulnerabilities and source code. The company states that it first became aware of the breach on August 9, 2025, with...

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

https://fed.brid.gy/r/https://www.wired.com/story/f5-hack-networking-software-big-ip/