Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical NGINX Vulnerability: Code Execution Risk via MP4

Critical NGINX Vulnerability: Code Execution Risk via MP4

Posted on March 25, 2026 By CWS

A newly discovered high-severity security vulnerability is impacting both NGINX Open Source and NGINX Plus platforms. This flaw, cataloged as CVE-2026-32647, has been assigned a CVSS v4.0 score of 8.5 and a CVSS v3.1 score of 7.8, highlighting its potential risk.

Vulnerability Overview

The vulnerability poses a threat by enabling local, authenticated attackers to induce a denial-of-service (DoS) state or execute arbitrary code on affected systems. Notably, this issue is confined to the application’s data plane, ensuring the control plane remains uncompromised. F5 has acknowledged security researchers Xint Code and Pavel Kohout of Aisle Research for their role in identifying and reporting this vulnerability.

Technical Details and Impact

The root cause lies in an out-of-bounds read vulnerability classified under CWE-125, specifically within the ngx_http_mp4_module module. By exploiting this flaw, attackers can coerce the NGINX server into processing a maliciously crafted MP4 file, which can lead to memory buffer overflows.

This memory mismanagement can result in the immediate termination of the worker process, thereby disrupting ongoing network operations until the process is restarted. More alarmingly, this memory corruption can potentially be leveraged to achieve remote code execution.

Mitigation Measures

For systems to be at risk, the NGINX setup must include the ngx_http_mp4_module and have the mp4 directive active in its configuration. While NGINX Plus incorporates this module by default, NGINX Open Source users must have manually enabled it.

F5 has released updates to rectify this vulnerability across affected versions. Specifically, NGINX Plus versions R32 through R36 and NGINX Open Source versions 1.1.19 through 1.29.6 are vulnerable, with patches available in newer releases.

Security teams are urged to promptly update to the latest versions. If immediate updates are not feasible, F5 suggests temporary configuration-based mitigations. This includes disabling the MP4 streaming feature by editing the NGINX configuration files found in the /etc/nginx directory, thereby neutralizing the threat vector.

Post-configuration, administrators should verify the syntax using sudo nginx -t before reloading the service to ensure security measures are in effect.

Limiting media upload privileges to trusted users is also recommended as a precautionary defense, preventing unauthorized exploitation through crafted MP4 files.

Stay informed with the latest cybersecurity updates by following us on Google News, LinkedIn, and X. For inquiries or to feature your cybersecurity story, please get in touch.

Cyber Security News Tags:code execution, CVE-2026-32647, Cybersecurity, F5, MP4, network security, NGINX, NGINX Plus, patch updates, security patches, server security, Software Security, system updates, threat mitigation, Vulnerability

Post navigation

Previous Post: FCC Prohibits Import of Foreign-Made Routers for Security
Next Post: Russian Hacker Jailed for Botnet Ransomware Crimes

Related Posts

Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Cyber Security News
Microsoft 365 PDF Export LFI Vulnerability Allows Access to Sensitive Server Data Microsoft 365 PDF Export LFI Vulnerability Allows Access to Sensitive Server Data Cyber Security News
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign Cyber Security News
Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Cyber Security News
Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Hacker Sentenced to Two-Year US Prison Term
  • GlassWorm Malware Exploits Solana for Data Theft
  • Mozilla Addresses 37 Security Flaws with Firefox 149 Release
  • Apple Updates iOS, macOS with Critical Security Fixes
  • Russian Hacker Jailed for Botnet Ransomware Crimes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Hacker Sentenced to Two-Year US Prison Term
  • GlassWorm Malware Exploits Solana for Data Theft
  • Mozilla Addresses 37 Security Flaws with Firefox 149 Release
  • Apple Updates iOS, macOS with Critical Security Fixes
  • Russian Hacker Jailed for Botnet Ransomware Crimes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark