When the Secure Stack Isn’t So Secure: Lessons from the F5 Incident
In October 2025, F5 Networks confirmed that a nation-state actor had gained long-term access to its internal development environment.
The attacker exfiltrated portions of BIG-IP source code, undisclosed vulnerability data, and engineering documentation, the digital blueprints for one of the most widely deployed application delivery platforms in the world.
F5 says there’s no evidence its source code or build pipelines were altered, a conclusion validated by external cybersecurity experts, but the implications go far beyond a single vendor.
For organizations that depend on F5, or any product buried deep in their network stack, this is a wake-up call: the most serious risks aren’t on the surface; they’re buried in the code, components, and firmware that legacy tools can’t see.
What Happened
F5 discovered the intrusion in August 2025, tracing it to a highly sophisticated nation-state campaign.
The actor moved through internal product-development and engineering knowledge platforms, stealing source code and vulnerability data before anyone knew they were there.
When the Blueprint Becomes the Incident
While F5 maintains that its software builds weren’t tampered with, the stolen data gives adversaries insight into design decisions and undisclosed flaws, a roadmap for finding weaknesses faster than defenders can patch them.
Some exfiltrated files even contained limited customer configuration details; F5 says those customers are being notified directly.
The Department of Justice authorized a disclosure delay on September 12, and F5 made the incident public on October 15 in its 8-K filing.
The company says the event has not had a material impact on operations.
Why It Matters
This is more than just another vendor compromise.
BIG-IP technology supports financial institutions, telecom carriers, critical infrastructure, and U.S. federal agencies, the connective tissue of modern networks. This explains, in short, why this incident has become a matter of national security.
When attackers infiltrate the systems that create and maintain that software, the blast radius extends everywhere the product is trusted.
And it’s happening at a time when federal cyber operations are stretched thin by the ongoing government shutdown.
Even as CISA issues emergency directives, the nation’s defenders are working under constrained capacity, just as adversaries gain unprecedented insight into a cornerstone of critical infrastructure.
The Hidden Layer
NetRise conducted a deep firmware analysis of F5’s BIG-IP Next (version 20.0.0-2.94.0+0.0.26). Using automated binary and artifact analysis, the NetRise platform identified 666 vulnerabilities (CVEs) across the compiled firmware image, including 67 critical and 285 high-severity issues.
Among these were 28 CVEs in components that execute at runtime, meaning they could be exploited during normal device operation. Several were tied to foundational services such as nginx and OpenSSH, which underpin secure communication and web handling. One of the most significant findings was CVE-2023-44487 — the HTTP/2 Rapid Reset vulnerability — discovered within nginx (version 1.18.0). This flaw is both weaponized and listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog.
NetRise’s analysis confirmed that these components are active at runtime, giving adversaries a direct path to exploitation. The analysis also uncovered multiple OpenSSH vulnerabilities (versions 8.9–8.9x), several with published proofs of concept demonstrating exploitability.
This level of visibility, rooted in binary code analysis rather than source-code scanning, is what’s required for third-party risk managers or product security leads to see the risks that attackers already understand. Once adversaries gain access to proprietary source code or vulnerability data, as occurred in the F5 incident, they can quickly map those same flaws and chain them into new exploit paths.
When defenders lack this visibility, every unverified dependency or misconfigured component becomes an attacker’s invitation.
If you don’t know what’s in your firmware, someone else eventually will, and they’ll know exactly where to strike.
Beyond Patching
The F5 incident revealed the limits of incomplete visibility. Vulnerability scanners identify only known CVEs. Compliance frameworks verify that policies exist, not that controls are effective. And risk questionnaires capture vendor intent, not the technical evidence beneath it. True assurance requires visibility beyond these indicators—into the compiled code, dependencies, and firmware layers where the real risks reside.
Source code reviews validate components that developers intend to include, not those that are unknowingly introduced when the code is built, linked, and shipped. And while threat feeds track known exploits, adversaries are already mapping what defenders can’t see.
The only way to identify the risks that actually exist in the code that executes on the device is to look inside compiled code, inherited components, and firmware layers that define how products actually behave.
True resilience requires more than controls, it requires visibility into what’s really inside the software your business depends on.
How NetRise Helps
NetRise delivers that deeper visibility. Our platform analyzes firmware and software artifacts at scale, revealing vulnerabilities, embedded credentials, easily cracked public/private key pairs, outdated components, and supply-chain dependencies that legacy tools can’t see.
For organizations navigating complex vendor ecosystems, this means replacing assumptions with evidence. For security teams, it means detecting and prioritizing risks before adversaries exploit them.
The F5 incident proves that attackers already see deeper than most defenders. NetRise gives defenders that same depth, without the compromise.
Conclusion
The F5 incident has shown how intertwined software security and national resilience have become. CISA’s emergency directive underscores that defending shared infrastructure now requires shared visibility, across every layer of the stack, from source code through firmware.
Trust in technology can’t substitute for understanding what lies within it. Trusting vendor responses to questionnaires can no longer substitute for analysis of the software they’ve created. As software supply chains expand, unseen risk multiplies in both volume and consequence.
Like the NPM attack earlier this year, it’s a reminder that the next exposure may not come from the code we deploy, but from the systems we trust to build it.
Organizations that maintain continuous insight into the components and dependencies shaping their systems, whether through internal programs or platforms like NetRise, will be best positioned to respond decisively when the next exposure emerges.
When adversaries gain the map, defenders must share the light.
Stay up to date with the news
Sign Up To Get Our Free Insights Delivered To Your Inbox
You might also like
Explore other exciting events!