Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/CyberSecurity News/F5 NGINX Plus and Open Source Vulnerability Allow Attackers to
CyberSecurity News

F5 NGINX Plus and Open Source Vulnerability Allow Attackers to

A high-severity vulnerability has emerged, impacting both NGINX Open Source and NGINX Plus. Identified as CVE-2026-32647, the flaw registers a CVSS v4.0 base score of 8.5 and a CVSS v3.1 score of...

David kimber
David kimber
March 25, 2026 2 Min Read
0 0

A high-severity vulnerability has emerged, impacting both NGINX Open Source and NGINX Plus. Identified as CVE-2026-32647, the flaw registers a CVSS v4.0 base score of 8.5 and a CVSS v3.1 score of 7.8.

It allows local, authenticated attackers to trigger a denial-of-service (DoS) condition or potentially execute arbitrary code on the underlying system.

The vulnerability exists entirely within the application’s data plane, so there is no control-plane exposure. F5 formally acknowledged researchers Xint Code and Pavel Kohout from Aisle Research for discovering and coordinating the disclosure of this vulnerability.

F5 NGINX Plus and Open Source Vulnerability

The core of this security issue stems from an out-of-bounds read vulnerability, classified under CWE-125. This memory corruption flaw is isolated within the ngx_http_mp4_module module.

Threat actors can exploit this weakness by forcing the NGINX server to process a specially crafted MP4 file.

When the NGINX worker process parses the malicious media file, it triggers a buffer overrun or underflow in the worker’s memory.

This memory manipulation immediately terminates the worker process, temporarily disrupting active network traffic while the system attempts to restart the process.

Beyond a simple denial-of-service, attackers could theoretically chain this memory corruption to achieve remote code execution on the host machine.

For a system to be vulnerable, the NGINX instance must be built with the ngx_http_mp4_module and actively use the mp4 directive within its configuration file. NGINX Plus includes this module automatically.

Conversely, NGINX Open Source administrators must have explicitly compiled and enabled the module to be at risk. F5 has released software updates to address this vulnerability across all impacted product branches.

Other F5 products, including BIG-IP, BIG-IQ, F5OS, and F5 Distributed Cloud, remain completely unaffected by this flaw. NGINX Plus versions R32 through R36 are vulnerable, with fixes available in R36 P3, R35 P2, and R32 P5.

NGINX Open Source versions 1.1.19 through 1.29.6 are affected, with patches released in versions 1.28.3 and 1.29.7.

Mitigations

Security teams are strongly advised to update their NGINX deployments to the latest patched releases immediately.

If immediate patching falls outside your current maintenance window, F5 recommends applying configuration-based mitigations to secure your infrastructure.

Administrators can neutralize the threat by temporarily turning off the MP4 streaming module. This requires logging into the NGINX host system and editing the primary configuration files, typically located in the /etc/nginx directory.

Security engineers must locate all server and location blocks utilizing the mp4 directive and comment them out using a hash character.

After saving the modified configuration, administrators should validate the syntax using the sudo nginx -t command before gracefully reloading the service.

While this mitigation turns off server-side pseudo-streaming support for MP4 files, it effectively removes the attack vector. As an additional defense-in-depth measure, organizations should restrict the publishing of audio and video files to trusted users only.

Restricting media publishing rights prevents unauthorized actors from introducing the crafted MP4 payload into the server environment.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Exploiting Magento RCE for Full Account Access

Next Post

Firefox 149 Released With Patch for 37 Vulnerabilities that

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us