In response to a significant breach involving widely used F5 software and devices, the Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive requiring federal agencies to secure their networks. The directive follows F5’s disclosure that a nation-state actor accessed sensitive data, including portions of its BIG-IP product source code and customer configurations.
CISA warns that the vulnerabilities could be exploited to extract credentials, move laterally within networks, and maintain persistent access.
Agencies are now required to identify all internet-connected F5 BIG-IP devices, both physical and virtual, by October 22 and apply vendor-issued patches.
They must report findings to CISA by October 29.
While no active exploitation of federal systems has been confirmed, CISA emphasizes the directive is a preemptive step to mitigate potential damage across federal civilian executive branch networks.
Why It Matters: This breach highlights the increasing threat of supply chain attacks, where vulnerabilities in common enterprise software become access points for sophisticated cyber actors. With F5 products used by 15 federal agencies and 80% of Fortune 500 companies, the ripple effects of this incident could extend far beyond the federal government.
- CISA Mandates Rapid Response to Vulnerabilities in BIG-IP Devices: The emergency directive requires all federal agencies to immediately identify both physical and virtual BIG-IP devices connected to their networks, especially those accessible via the internet. Agencies must apply the latest security patches released by F5 no later than October 22 and submit comprehensive reports detailing their F5 infrastructure to CISA by October 29. These measures aim to prevent potential exploitation of embedded credentials and API keys that may have been exposed during the breach.
- F5 Discloses Sophisticated, Long-Term Breach by Nation-State Hackers: In a disclosure to the Securities and Exchange Commission (SEC), F5 revealed that a nation-state actor had maintained persistent access to internal systems since at least early August. Attackers exfiltrated key files from F5’s BIG-IP development environment and knowledge management systems, including portions of source code and details on still-unpatched vulnerabilities. Although F5 said it has found no evidence that its software supply chain was modified, the depth of access suggests a high level of sophistication and risk.
- Federal Networks Not Yet Compromised — But Risk Remains High: CISA’s Executive Assistant Director for Cybersecurity, Nick Andersen, stated that there is currently no evidence of federal agency systems being compromised as a result of the F5 breach. However, he warned that the threat actors could potentially use stolen information to move laterally within networks, establish persistent access, and exfiltrate sensitive data. The emergency directive is designed to proactively assess and contain any exposure before an active exploitation campaign begins.
- Incident Reflects a Growing Pattern of Supply Chain Cyberattacks: This breach is part of a broader trend of adversaries targeting the software supply chain, exploiting security gaps in products used across multiple organizations to gain widespread access. CISA officials described this as a strategic campaign that impacts not just individual entities, but entire ecosystems, including federal civilian agencies, infrastructure providers, and private sector partners who share common tools and technologies.
- Cybersecurity Response Continues Despite Government Shutdown: Though many government operations are limited due to the federal shutdown, CISA affirmed that essential cybersecurity operations are still functioning. Most federal agencies retain core IT and cybersecurity personnel during shutdowns to maintain operational continuity and respond to critical threats. Andersen said he was unaware of staffing shortages affecting cybersecurity response but acknowledged the shutdown adds complexity to coordinating swift action across agencies.
Go Deeper -> CISA directs agencies to address ‘significant cyber threat’ – Federal News Network
Trusted insights for technology leaders
Our readers are CIOs, CTOs, and senior IT executives who rely on The National CIO Review for smart, curated takes on the trends shaping the enterprise, from GenAI to cybersecurity and beyond.
Subscribe to our 4x a week newsletter to keep up with the insights that matter.


