8.2

CVE-2026-1642

NGINX vulnerability

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5Nginx Gateway Fabric Version >= 1.2.0 <= 1.6.2
F5Nginx Gateway Fabric Version >= 2.0.0 < 2.4.1
F5Nginx Ingress Controller Version >= 3.4.0 <= 3.7.2
F5Nginx Ingress Controller Version >= 4.0.0 <= 4.0.1
F5Nginx Ingress Controller Version >= 5.0.0 < 5.3.3
F5Nginx Instance Manager Version >= 2.15.1 <= 2.21.0
F5Nginx Open Source Version >= 1.3.0 < 1.28.2
F5Nginx Open Source Version >= 1.29.0 < 1.29.5
F5Nginx Plus Version >= r33 < r35
F5Nginx Plus Versionr32 Update-
F5Nginx Plus Versionr32 Updatep1
F5Nginx Plus Versionr32 Updatep2
F5Nginx Plus Versionr32 Updatep3
F5Nginx Plus Versionr33 Updatep1
F5Nginx Plus Versionr33 Updatep2
F5Nginx Plus Versionr33 Updatep3
F5Nginx Plus Versionr34 Updatep1
F5Nginx Plus Versionr34 Updatep2
F5Nginx Plus Versionr35 Update-
F5Nginx Plus Versionr36 Update-
F5Nginx Plus Versionr36 Updatep1
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.033
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
f5sirt@f5.com 8.2 0 0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
f5sirt@f5.com 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-345 Insufficient Verification of Data Authenticity

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data

The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.