Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Home/CyberSecurity News/F5 Patches Critical BIG-IP, NGINX Vulnerabilities Related
CyberSecurity News

F5 Patches Critical BIG-IP, NGINX Vulnerabilities Related

F5’s February 2026 Quarterly Security Notification, released on February 4, details several medium and low-severity CVEs. The bulletin also outlines a security exposure impacting BIG-IP, NGINX,...

Jennifer sherman
Jennifer sherman
February 6, 2026 2 Min Read
5 0

F5’s February 2026 Quarterly Security Notification, released on February 4, details several medium and low-severity CVEs. The bulletin also outlines a security exposure impacting BIG-IP, NGINX, and container services.

These issues primarily stem from denial-of-service (DoS) risks and configuration weaknesses, potentially disrupting high-traffic environments like web application firewalls (WAF) and Kubernetes ingress.

While no active exploits are reported, prompt patching is urged for internet-facing deployments to mitigate DoS chains or unauthorized access.

F5 provides CVSS v3.1 and v4.0 scores for first-party issues, emphasizing attack vector, privileges, and impact. A live briefing video is available via DevCentral. Details link to F5’s knowledge base.

These three flaws pose moderate DoS threats, with CVSS scores up to 8.2 (v4.0). Attackers could overwhelm services remotely.

Article (CVE) CVSS v3.1 / v4.0 Affected Products Affected Versions Fixes Introduced In
K000158072: BIG-IP Advanced WAF/ASM (CVE-2026-22548) 5.9 / 8.2 BIG-IP Advanced WAF/ASM 17.1.0 – 17.1.2 17.1.3
K000159824: NGINX (CVE-2026-1642) 5.9 / 8.2 NGINX Plus (R32-R36 P1), Open Source (1.3.0-1.29.4), Ingress Controller (5.3.0-5.3.2; 4.0.0-4.0.1; 3.4.0-3.7.1), Gateway Fabric (2.0.0-2.4.0; 1.2.0-1.6.2), Instance Manager (2.15.1-2.21.0) R36 P2, R35 P1, R32 P4; 1.29.5, 1.28.2; None; None; None
K000157960: BIG-IP CIS (CVE-2026-22549) 4.9 / 6.9 BIG-IP Container Ingress Services (Kubernetes/OpenShift) 2.0.0-2.20.1; 1.0.0-1.14.0 2.20.2; 2.20.1 (Helm 0.0.363)

Impact Assessment: CVE-2026-1642 affects the broadest NGINX ecosystem, enabling network-adjacent DoS via crafted requests. WAF/ASM and CIS flaws target F5’s containerized services, risking outages in hybrid clouds.

Lower-risk issues focus on local or adjacent attacks.

Article (CVE) CVSS v3.1 / v4.0 Affected Products Affected Versions Fixes Introduced In
K000158931: BIG-IP Edge Client (CVE-2026-20730) 3.3 / 2.0 BIG-IP APM (21.0.0; 17.5.0-17.5.1; etc.); APM Clients 17.1.3.13; 7.2.6.2 17.1.3.13, 7.2.6.2
K000156644: BIG-IP Config Utility (CVE-2026-20732) 3.1 / 2.3 BIG-IP (all modules) 17.5.1.4; 17.1.3.1 17.5.1.4
17.1.3.1

Notes: Edge Client requires Component Update enabled post-upgrade. Config utility flaw allows local privilege escalation.

Security Exposures

Article Affected Products Affected Versions Fixes Introduced In
K000156643: BIG-IP SMTP Config BIG-IP (all modules) 21.0.0; 17.5.0-17.5.1; etc. 21.0.0.1; 17.5.1.4; 17.1.3.1

This exposure risks SMTP misconfigurations leading to relay abuse.

Prioritize medium CVEs in NGINX-heavy setups. Scan for affected versions (pre-EoTS only), apply fixes via iHealth or Helm for CIS. Test in staging to avoid disruptions. Monitor the Medium, Low, and Exposures pages. F5’s CVSS v4.0 shift aids precise risk scoring, see K000140363.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Spam Campaign Uses Fake PDFs to Install Remote Monitoring

Next Post

CISA Warns: React Native Command Injection Community Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
May 15, 2026
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
May 15, 2026
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us