CVE-2026-32647

Discovered by AISLEPUBLISHEDCWE-125

Description

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS Base Scores

CVSS v4.08.5

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CVSS v3.1
7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products

VendorProductVersionStatus
F5NGINX Open Source1.29.0affected
F5NGINX Open Source1.1.19
F5NGINX Open SourceR36
F5NGINX Open SourceR35
F5NGINX Open SourceR34
F5NGINX Open SourceR33
F5NGINX Open SourceR32
F5NGINX Plus1.29.0affected
F5NGINX Plus1.1.19
F5NGINX PlusR36
F5NGINX PlusR35
F5NGINX PlusR34
F5NGINX PlusR33
F5NGINX PlusR32

Credits

  • F5 acknowledges Xint Code and Pavel Kohout (Aisle Research) for bringing this issue to our attention and following the highest standards of coordinated disclosure.(reporter)

References