CVE Vulnerabilities

CVE-2026-20732

User Interface (UI) Misrepresentation of Critical Information

Published: Feb 04, 2026 | Modified: Feb 13, 2026
CVSS 3.x
4.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability exists in an undisclosed BIG-IP Configuration utility page that may allow an attacker to spoof error messages.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Weakness

The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.

Affected Software

NameVendorStart VersionEnd Version
Big-ip_access_policy_managerF516.1.0 (including)16.1.6 (including)
Big-ip_advanced_firewall_managerF516.1.0 (including)16.1.6 (including)
Big-ip_advanced_web_application_firewallF516.1.0 (including)16.1.6 (including)
Big-ip_analyticsF516.1.0 (including)16.1.6 (including)
Big-ip_application_acceleration_managerF516.1.0 (including)16.1.6 (including)
Big-ip_application_security_managerF516.1.0 (including)16.1.6 (including)
Big-ip_application_visibility_and_reportingF516.1.0 (including)16.1.6 (including)
Big-ip_automation_toolchainF516.1.0 (including)16.1.6 (including)
Big-ip_carrier-grade_natF516.1.0 (including)16.1.6 (including)
Big-ip_container_ingress_servicesF516.1.0 (including)16.1.6 (including)
Big-ip_ddos_hybrid_defenderF516.1.0 (including)16.1.6 (including)
Big-ip_domain_name_systemF516.1.0 (including)16.1.6 (including)
Big-ip_edge_gatewayF516.1.0 (including)16.1.6 (including)
Big-ip_fraud_protection_serviceF516.1.0 (including)16.1.6 (including)
Big-ip_global_traffic_managerF516.1.0 (including)16.1.6 (including)
Big-ip_link_controllerF516.1.0 (including)16.1.6 (including)
Big-ip_local_traffic_managerF516.1.0 (including)16.1.6 (including)
Big-ip_policy_enforcement_managerF516.1.0 (including)16.1.6 (including)
Big-ip_ssl_orchestratorF516.1.0 (including)16.1.6 (including)
Big-ip_webacceleratorF516.1.0 (including)16.1.6 (including)
Big-ip_websafeF516.1.0 (including)16.1.6 (including)

Extended Description

If an attacker can cause the UI to display erroneous data, or to otherwise convince the user to display information that appears to come from a trusted source, then the attacker could trick the user into performing the wrong action. This is often a component in phishing attacks, but other kinds of problems exist. For example, if the UI is used to monitor the security state of a system or network, then omitting or obscuring an important indicator could prevent the user from detecting and reacting to a security-critical event. UI misrepresentation can take many forms:

Potential Mitigations

References