{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:26:01.737","vulnerabilities":[{"cve":{"id":"CVE-2020-5893","sourceIdentifier":"f5sirt@f5.com","published":"2020-04-30T21:15:17.463","lastModified":"2024-11-21T05:34:46.830","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In versions 7.1.5-7.1.8, when a user connects to a VPN using BIG-IP Edge Client over an unsecure network, BIG-IP Edge Client responds to authentication requests over HTTP while sending probes for captive portal detection."},{"lang":"es","value":"En las versiones 7.1.5 hasta 7.1.8, cuando un usuario se conecta a una VPN usando BIG-IP Edge Client por medio de una red no segura, BIG-IP Edge Client responde a las peticiones de autenticación por medio de HTTP mientras envía sondas para la detección del portal cautivo."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":3.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-319"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.6.1","versionEndIncluding":"11.6.5","matchCriteriaId":"2FBA9552-4645-4BFF-91A4-47B6A3414325"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndIncluding":"12.1.5","matchCriteriaId":"6C3B5688-0235-4D4F-A26C-440FF24A1B43"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndIncluding":"13.1.3","matchCriteriaId":"6FCB6C17-33AC-4E5E-8633-7490058CA51F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndIncluding":"14.1.2","matchCriteriaId":"FCBAF5C1-3761-47BB-AD8E-A55A64D33AF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndIncluding":"15.1.0","matchCriteriaId":"EFBB9E7C-08D1-4B30-AD3B-CADBF30D756B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager_client:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.5","versionEndExcluding":"7.1.9","matchCriteriaId":"22A479A8-904D-4959-B554-5150505BE438"}]}]}],"references":[{"url":"https://support.f5.com/csp/article/K97733133","source":"f5sirt@f5.com","tags":["Vendor Advisory"]},{"url":"https://support.f5.com/csp/article/K97733133","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}