First published: Thu Apr 30 2020(Updated: )
In versions 7.1.5-7.1.8, when a user connects to a VPN using BIG-IP Edge Client over an unsecure network, BIG-IP Edge Client responds to authentication requests over HTTP while sending probes for captive portal detection.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Big-ip Access Policy Manager | >=11.6.1<=11.6.5 | |
F5 Big-ip Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Big-ip Access Policy Manager | >=13.1.0<=13.1.3 | |
F5 Big-ip Access Policy Manager | >=14.0.0<=14.1.2 | |
F5 Big-ip Access Policy Manager | >=15.0.0<=15.1.0 | |
F5 Big-ip Access Policy Manager Client | >=7.1.5<7.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5893 is a vulnerability in F5 Big-ip Access Policy Manager, versions 7.1.5-7.1.8, that allows authentication requests to be sent over HTTP on an unsecure network.
CVE-2020-5893 affects F5 Big-ip Access Policy Manager versions 7.1.5-7.1.8 by allowing authentication requests to be sent over HTTP on an unsecure network.
CVE-2020-5893 has a severity rating of medium with a value of 3.7.
To fix CVE-2020-5893, upgrade F5 Big-ip Access Policy Manager to a version higher than 7.1.8.
You can find more information about CVE-2020-5893 at the following link: https://support.f5.com/csp/article/K97733133