CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

f5

big-ip_access_policy_manager_client

20 known vulnerabilities · sorted by CVSS score

CVE-2020-5897
HIGH8.8

In versions 7.1.5-7.1.9, there is use-after-free memory vulnerability in the BIG-IP Edge Client Windows ActiveX component.

f5 / big-ip_access_policy_manager+5
Network
Published May 12, 2020
CVE-2020-5896
HIGH7.8

On versions 7.1.5-7.1.9, the BIG-IP Edge Client's Windows Installer Service's temporary folder has weak file and folder permissions.

f5 / big-ip_access_policy_manager+5
Local
Published May 12, 2020
CVE-2018-5546
HIGH7.8

The svpn and policyserver components of the F5 BIG-IP APM client prior to version 7.1.7.1 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or assume super-user privileges on the local client host.

f5 / big-ip_access_policy_manager_client+1
Local
Published Aug 17, 2018
CVE-2018-5547
HIGH7.8

Windows Logon Integration feature of F5 BIG-IP APM client prior to version 7.1.7.1 for Windows by default uses Legacy logon mode which uses a SYSTEM account to establish network access. This feature displays a certificate user interface dialog box which contains the link to the certificate policy. By clicking on the link, unprivileged users can open additional dialog boxes and get access to the local machine windows explorer which can be used to get administrator privilege. Windows Logon Integration is vulnerable when the APM client is installed by an administrator on a user machine. Users accessing the local machine can get administrator privileges

f5 / big-ip_access_policy_manager_client+2
Local
Published Aug 17, 2018
CVE-2021-23022
HIGH7.8

On version 7.2.1.x before 7.2.1.3 and 7.1.x before 7.1.9.9 Update 1, the BIG-IP Edge Client Windows Installer Service's temporary folder has weak file and folder permissions. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

f5 / big-ip_access_policy_manager+3
Local
Published Jun 10, 2021
CVE-2019-6656
HIGH7.5

BIG-IP APM Edge Client before version 7.1.8 (7180.2019.508.705) logs the full apm session ID in the log files. Vulnerable versions of the client are bundled with BIG-IP APM versions 15.0.0-15.0.1, 14,1.0-14.1.0.6, 14.0.0-14.0.0.4, 13.0.0-13.1.1.5, 12.1.0-12.1.5, and 11.5.1-11.6.5. In BIG-IP APM 13.1.0 and later, the APM Clients components can be updated independently from BIG-IP software. Client version 7.1.8 (7180.2019.508.705) and later has the fix.

f5 / big-ip_access_policy_manager+6
Network
Published Sep 25, 2019
CVE-2024-28883
HIGH7.4

An origin validation vulnerability exists in BIG-IP APM browser network access VPN client for Windows, macOS and Linux which may allow an attacker to bypass F5 endpoint inspection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

f5 / big-ip_access_policy_manager+3
Network
Published May 8, 2024
CVE-2022-28714
HIGH7.3

On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, a DLL Hijacking vulnerability exists in the BIG-IP Edge Client Windows Installer. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

f5 / big-ip_access_policy_manager+38
Local
Published May 5, 2022
CVE-2025-48500
HIGH7.3

A missing file integrity check vulnerability exists on MacOS F5 VPN browser client installer that may allow a local, authenticated attacker with access to the local file system to replace it with a malicious package installer.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

f5 / big-ip_access_policy_manager+4
Local
Published Aug 13, 2025
CVE-2018-15332
HIGH7.0

The svpn component of the F5 BIG-IP APM client prior to version 7.1.7.2 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host in a race condition.

f5 / big-ip_access_policy_manager+4
Local
Published Dec 6, 2018
CVE-2023-43125
MEDIUM6.8

BIG-IP APM clients may send IP traffic outside of the VPN tunnel.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

f5 / big-ip_access_policy_manager+5
Adjacent
Published Sep 27, 2023
CVE-2020-5892
MEDIUM6.7

In versions 7.1.5-7.1.8, the BIG-IP Edge Client components in BIG-IP APM, Edge Gateway, and FirePass legacy allow attackers to obtain the full session ID from process memory.

f5 / big-ip_access_policy_manager+10
Local
Published Apr 30, 2020
CVE-2018-15316
MEDIUM5.5

In F5 BIG-IP APM 13.0.0-13.1.1.1, APM Client 7.1.5-7.1.6, and/or Edge Client 7101-7160, the BIG-IP APM Edge Client component loads the policy library with user permission and bypassing the endpoint checks.

f5 / big-ip_access_policy_manager+2
Local
Published Oct 19, 2018
CVE-2022-27636
MEDIUM5.5

On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, as well as F5 BIG-IP APM Clients 7.x versions prior to 7.2.1.5, BIG-IP Edge Client may log sensitive APM session-related information when VPN is launched on a Windows system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

f5 / big-ip_access_policy_manager+31
Local
Published May 5, 2022
CVE-2020-5898
MEDIUM5.5

In versions 7.1.5-7.1.9, BIG-IP Edge Client Windows Stonewall driver does not sanitize the pointer received from the userland. A local user on the Windows client system can send crafted DeviceIoControl requests to \\.\urvpndrv device causing the Windows kernel to crash.

f5 / big-ip_access_policy_manager+5
Local
Published May 12, 2020
CVE-2023-43124
MEDIUM5.3

BIG-IP APM clients may send IP traffic outside of the VPN tunnel.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

f5 / big-ip_access_policy_manager+5
Adjacent
Published Sep 27, 2023
CVE-2022-23032
MEDIUM5.3

In all versions before 7.2.1.4, when proxy settings are configured in the network access resource of a BIG-IP APM system, connecting BIG-IP Edge Client on Mac and Windows is vulnerable to a DNS rebinding attack. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

f5 / big-ip_access_policy_manager+7
Network
Published Jan 25, 2022
CVE-2020-5855
MEDIUM4.3

When the Windows Logon Integration feature is configured for all versions of BIG-IP Edge Client for Windows, unauthorized users who have physical access to an authorized user's machine can get shell access under unprivileged user.

f5 / big-ip_access_policy_manager+5
Physical
Published Feb 6, 2020
CVE-2020-5893
LOW3.7

In versions 7.1.5-7.1.8, when a user connects to a VPN using BIG-IP Edge Client over an unsecure network, BIG-IP Edge Client responds to authentication requests over HTTP while sending probes for captive portal detection.

f5 / big-ip_access_policy_manager+5
Network
Published Apr 30, 2020
CVE-2026-20730
LOW3.3

A vulnerability exists in BIG-IP Edge Client and browser VPN clients on Windows that may allow attackers to gain access to sensitive information.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

f5 / big-ip_access_policy_manager+4
Local
Published Feb 4, 2026