Skip to content

F5 Updates: Latest Security
Advisory and CVEs


WorldTech IT is Your Trusted F5 Platinum Partner

Security Incident Overview

F5 disclosed a targeted nation-state intrusion in its internal product development and knowledge systems. There is no evidence of compromise to customer environments or active exploitation of undisclosed vulnerabilities. In response, F5 rotated credentials and strengthened access controls, automated patch and inventory management, enhanced network security, and hardened its development platforms with continuous monitoring. F5 also engaged CrowdStrike, Mandiant, NCC Group, and IOActive for independent validation and released updated software for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients.

Full Advisory: F5 Security Incident (K000154696)

Hardware & Software Upgrades

As we review this quarter’s CVEs, keep in mind that all F5 hardware and software follow defined lifecycles, meaning support, software patches, and CVE updates will end soon, increasing operational and security risk:

Date Upgrade
Apr-25 Hardware
End of Technical Support (EoTS) / RMA (EoRMA)
Legacy 2000s–10050s series, VIPRION B4300, Common Criteria LTM units
Jul-25
Software
End of Software Development (EoSD) & Support (EoTS)
BIG-IP 16.1.x
Oct-25 (No lifecycle events scheduled)
Jan-26
Hardware
End of New SW Support (EoNSS) / End of Sale (EoS)
iSeries (i850 → i11800), VIPRION 4480 / 4800 / B4450 / B4460
Jan-26
Software
End of Software Development (EoSD) & Support (EoTS)
BIG-IP 15.1.x FIPS

If you’d like assistance scoping an upgrade or patching plan, request a quick consultation below.

CVE Insights

The highest vulnerabilities reported this quarter score CVSS v3.1 8.8 and CVSS v4.0 8.7. There are a variety of issues disclosed which can impact most installations. The remaining CVEs are of a High, Medium, and Low nature.

Below is the link to the list and a count of CVEs: https://my.f5.com/manage/s/article/K000156572

Security Count
High CVEs 27
Medium CVE 16
Low CVE 1
Security Exposures 1

If you would like to begin scheduling a code upgrade to eliminate these vulnerabilities or pursue the listed mitigation techniques, please reply to this email so we can design a solution that fits your needs.