I'm surprised I've not seen this mentioned on here at all, so if you weren't aware, F5 announced it had suffered a major security breach last week:
https://my.f5.com/manage/s/article/K000154696
Their CEO posted this on LinkedIn a little while ago:
Which in turn includes a link to a blog post from their CISO:
https://www.f5.com/company/blog/lessons-we-are-learning-from-our-security-incident
Here's CISA's emergency directive on the subject:
https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices
Are folks just not using F5 anymore, so not really interested in this?
What seems to have occurred is that someone got into F5's internal documents, and the worry is they can use that info to craft attacks against F5 devices. The fact that F5 has released mitigating patches tells me that somewhere in those documents may be things like API keys or other configuration-type info that could lead to elevated access to the devices. However, the between-the-lines seems to say the stolen information by itself shouldn't cause a compromise.
Maybe that is part of the shoulder-shrug to all this is that there is not an actual attack (yet) tied to this breach.