When the foundation is breached: Lessons from the F5 incident

By Kris Lovejoy, Global Practice Leader, Cyber Resilience at Kyndryl, and Paul Savill, Global Practice Leader, Network and Edge at Kyndryl

When the source code of an application security provider is compromised, it’s not a niche cybersecurity story. It’s a moment that tests enterprise resilience itself.

The recent breach of F5’s source code by a suspected China-nexus threat dubbed UNC5221 has created exactly that kind of moment. Unlike cyber incidents that disrupt daily operations, this one strikes at something deeper: the trustworthiness of the critical code running at the heart of many enterprise networks.

This latest case, which follows the CrowdStrike-triggered global outage in August 2024, reveals that even trusted vendors can become unsuspecting sources of risk. For technology leaders who still rely on F5 BIG-IP hardware or software, this represents an imperative for decisive action.

At first blush, the F5 breach might appear as a mere vulnerability in need of a patch. The reality is much different. Source code exposure can lead to undetected backdoors, hidden vulnerabilities, and zero-day exploits that even a vendor may not fully anticipate. For enterprises that still run older or soon-to-be unsupported F5 systems, their risk compounds. Many of those products may reach end-of-service or end-of-support in the near-term, which means they can no longer be reliably patched or verified.

Simply put, you can’t patch your way out of a source code breach.

This is an uncomfortable intersection, one at which legacy meets compromise. An enterprise might have built its traffic management or secure access around F5’s trusted technology years ago — but that same trust now requires re-examination and scrutiny. Operating end-of-service infrastructure in today’s environment isn’t just an issue of navigating technical debt, it can also be a potential point-of-entry for attackers who may now understand the system better than they did before.

Kyndryl’s global security and infrastructure experts work with technology and security leaders across industries to assess risk and chart pragmatic strategies forward. In many cases, that begins with a timely and comprehensive health check — auditing configurations, mapping out vulnerabilities, and establishing a secure performance baseline. From there, some enterprises can choose to upgrade to better-supported, long-term releases of F5’s software. Others will use this moment to rethink their broader strategies and even shift to hybrid or cloud-native architectures that integrate load balancing, web application protection, and secure access as services, not hardware dependencies.

Whichever path leaders choose, the takeaway is clear: resilience cannot be assumed. It must be thoughtfully designed with continuous modernization, diversified vendor strategies, and proactive security hardening in mind. This approach will help ensure that mission-critical infrastructure is ready for what lies just around the corner. For leaders who are unsure of the best path forward, Kyndryl’s deep expertise and strategic partnership can provide both much-needed clarity and a concrete plan.

It's an engagement designed to analyze an enterprise’s current environment in the context of its business goals and risk tolerance, helping leaders decide whether to stay on F5, implement a hybrid solution, or migrate entirely.

The F5 breach serves as an important reminder. Risk doesn’t always appear as downtime. Sometimes, it hides in the code itself — quiet and invisible. Responding effectively means seeing modernization not as a cost, but as an act of security.

At Kyndryl, we believe that a thoughtful, proactive approach is what every organization needs: one that pairs stability with adaptability, so the systems that carry the world’s digital traffic remain both trusted and secure.

Kris Lovejoy

Global Cyber Resilience Practice Leader

Paul Savill

Global Network and Edge Practice Leader