Description
A vulnerability exists in BIG-IP Edge Client and browser VPN clients on Windows that may allow attackers to gain access to sensitive information.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Published: 2026-02-04
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure
Action: Patch Immediately
AI Analysis

Impact

A vulnerability exists in the BIG‑IP Edge Client and browser VPN clients on Windows that enables attackers to read confidential data. The weakness is a failure to properly restrict access to sensitive information, which can expose credentials, configuration data, or other protected information. The issue falls under the security weakness type of Information Exposure (CWE‑200).

Affected Systems

The affected products are F5 BIG‑IP Edge Client and associated browser VPN client components for Windows. Versions are not explicitly enumerated in the advisory but the advisory references the broader product family, so any installation of the Edge Client or the browser VPN client running on Windows could be impacted. Organizations using the F5 BIG‑IP Access Policy Manager platform, particularly versions noted in the included CPE list, should verify whether these components are deployed.

Risk and Exploitability

The CVSS score of 2 indicates a low severity assessment. Exploit probability remains very low with an EPSS score less than 1%, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Because the flaw resides in client‑side software that runs on Windows machines, the likely attack vector is local exploitation on a compromised machine or remote exploitation by an attacker who can coerce a user to run the vulnerable client. No public exploit code is reported, so the risk is primarily due to inadvertent data exposure rather than active exploitation by threat actors.

Generated by OpenCVE AI on April 18, 2026 at 14:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor‑supplied patch or upgrade to a supported BIG‑IP Edge Client version on Windows that addresses the information exposure.
  • If an immediate patch is unavailable, promptly disable or uninstall the BIG‑IP Edge Client and any browser VPN client components on Windows endpoints to eliminate the vulnerable path.
  • Review and strengthen network segmentation and access controls so that only authorized traffic can reach Edge Client services.
  • Monitor logs for anomalous data exfiltration or unauthorized VPN connections, and enforce strict monitoring of VPN usage.

Generated by OpenCVE AI on April 18, 2026 at 14:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared F5 big-ip Access Policy Manager
F5 big-ip Access Policy Manager Client
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:17.5.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager:17.5.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_access_policy_manager_client:*:*:*:*:*:*:*:*
Vendors & Products F5 big-ip Access Policy Manager
F5 big-ip Access Policy Manager Client

Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared F5
F5 big-ip Edge Client
Vendors & Products F5
F5 big-ip Edge Client

Wed, 04 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in BIG-IP Edge Client and browser VPN clients on Windows that may allow attackers to gain access to sensitive information.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Title BIG-IP Edge Client for Windows vulnerability
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

F5 Big-ip Access Policy Manager Big-ip Access Policy Manager Client Big-ip Edge Client
cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2026-02-04T16:10:57.286Z

Reserved: 2026-01-21T21:33:16.349Z

Link: CVE-2026-20730

cve-icon Vulnrichment

Updated: 2026-02-04T16:10:48.801Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T15:16:14.570

Modified: 2026-02-13T21:36:18.327

Link: CVE-2026-20730

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:15:04Z

Weaknesses