A vulnerability exists in an undisclosed BIG-IP Configuration utility page that may allow an attacker to spoof error messages.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
History

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared F5 big-ip Access Policy Manager
F5 big-ip Advanced Firewall Manager
F5 big-ip Advanced Web Application Firewall
F5 big-ip Analytics
F5 big-ip Application Acceleration Manager
F5 big-ip Application Security Manager
F5 big-ip Application Visibility And Reporting
F5 big-ip Automation Toolchain
F5 big-ip Carrier-grade Nat
F5 big-ip Container Ingress Services
F5 big-ip Ddos Hybrid Defender
F5 big-ip Domain Name System
F5 big-ip Edge Gateway
F5 big-ip Fraud Protection Service
F5 big-ip Global Traffic Manager
F5 big-ip Link Controller
F5 big-ip Local Traffic Manager
F5 big-ip Policy Enforcement Manager
F5 big-ip Ssl Orchestrator
F5 big-ip Webaccelerator
F5 big-ip Websafe
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_automation_toolchain:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_container_ingress_services:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*
Vendors & Products F5 big-ip Access Policy Manager
F5 big-ip Advanced Firewall Manager
F5 big-ip Advanced Web Application Firewall
F5 big-ip Analytics
F5 big-ip Application Acceleration Manager
F5 big-ip Application Security Manager
F5 big-ip Application Visibility And Reporting
F5 big-ip Automation Toolchain
F5 big-ip Carrier-grade Nat
F5 big-ip Container Ingress Services
F5 big-ip Ddos Hybrid Defender
F5 big-ip Domain Name System
F5 big-ip Edge Gateway
F5 big-ip Fraud Protection Service
F5 big-ip Global Traffic Manager
F5 big-ip Link Controller
F5 big-ip Local Traffic Manager
F5 big-ip Policy Enforcement Manager
F5 big-ip Ssl Orchestrator
F5 big-ip Webaccelerator
F5 big-ip Websafe

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared F5
F5 big-ip
Vendors & Products F5
F5 big-ip

Wed, 04 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in an undisclosed BIG-IP Configuration utility page that may allow an attacker to spoof error messages.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title BIG-IP Configuration utility vulnerability
Weaknesses CWE-451
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published: 2026-02-04T15:02:05.281Z

Updated: 2026-02-04T16:08:05.470Z

Reserved: 2026-01-21T21:33:16.381Z

Link: CVE-2026-20732

cve-icon Vulnrichment

Updated: 2026-02-04T16:07:56.927Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T15:16:14.740

Modified: 2026-02-13T21:44:33.627

Link: CVE-2026-20732

cve-icon Redhat

No data.