Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical NGINX Vulnerability: Code Execution Risk via MP4

Critical NGINX Vulnerability: Code Execution Risk via MP4

Posted on March 25, 2026 By CWS

A newly discovered high-severity security vulnerability is impacting both NGINX Open Source and NGINX Plus platforms. This flaw, cataloged as CVE-2026-32647, has been assigned a CVSS v4.0 score of 8.5 and a CVSS v3.1 score of 7.8, highlighting its potential risk.

Vulnerability Overview

The vulnerability poses a threat by enabling local, authenticated attackers to induce a denial-of-service (DoS) state or execute arbitrary code on affected systems. Notably, this issue is confined to the application’s data plane, ensuring the control plane remains uncompromised. F5 has acknowledged security researchers Xint Code and Pavel Kohout of Aisle Research for their role in identifying and reporting this vulnerability.

Technical Details and Impact

The root cause lies in an out-of-bounds read vulnerability classified under CWE-125, specifically within the ngx_http_mp4_module module. By exploiting this flaw, attackers can coerce the NGINX server into processing a maliciously crafted MP4 file, which can lead to memory buffer overflows.

This memory mismanagement can result in the immediate termination of the worker process, thereby disrupting ongoing network operations until the process is restarted. More alarmingly, this memory corruption can potentially be leveraged to achieve remote code execution.

Mitigation Measures

For systems to be at risk, the NGINX setup must include the ngx_http_mp4_module and have the mp4 directive active in its configuration. While NGINX Plus incorporates this module by default, NGINX Open Source users must have manually enabled it.

F5 has released updates to rectify this vulnerability across affected versions. Specifically, NGINX Plus versions R32 through R36 and NGINX Open Source versions 1.1.19 through 1.29.6 are vulnerable, with patches available in newer releases.

Security teams are urged to promptly update to the latest versions. If immediate updates are not feasible, F5 suggests temporary configuration-based mitigations. This includes disabling the MP4 streaming feature by editing the NGINX configuration files found in the /etc/nginx directory, thereby neutralizing the threat vector.

Post-configuration, administrators should verify the syntax using sudo nginx -t before reloading the service to ensure security measures are in effect.

Limiting media upload privileges to trusted users is also recommended as a precautionary defense, preventing unauthorized exploitation through crafted MP4 files.

Stay informed with the latest cybersecurity updates by following us on Google News, LinkedIn, and X. For inquiries or to feature your cybersecurity story, please get in touch.

Cyber Security News Tags:code execution, CVE-2026-32647, Cybersecurity, F5, MP4, network security, NGINX, NGINX Plus, patch updates, security patches, server security, Software Security, system updates, threat mitigation, Vulnerability

Post navigation

Previous Post: FCC Prohibits Import of Foreign-Made Routers for Security
Next Post: Russian Hacker Jailed for Botnet Ransomware Crimes

Related Posts

Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News
North Korean Hackers Make History with  Billion Crypto Heist in 2025 North Korean Hackers Make History with $2 Billion Crypto Heist in 2025 Cyber Security News
New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System Cyber Security News
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Cyber Security News
Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor Cyber Security News
Hidden Malware in Open VSX Extension Threatens Developers Hidden Malware in Open VSX Extension Threatens Developers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Advances Cyber Threats, But Identity Remains Key
  • AI Security Innovations Shine at 2026 Cyber Awards
  • Onit Security Secures $11M for Advanced Cyber Solutions
  • Microsoft 365 Device Code Phishing Targets Over 340 Organizations
  • Firefox 149.0 Introduces Free VPN with 50GB Limit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Advances Cyber Threats, But Identity Remains Key
  • AI Security Innovations Shine at 2026 Cyber Awards
  • Onit Security Secures $11M for Advanced Cyber Solutions
  • Microsoft 365 Device Code Phishing Targets Over 340 Organizations
  • Firefox 149.0 Introduces Free VPN with 50GB Limit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark