8.2

CVE-2026-1642

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
F5Nginx Gateway Fabric Version >= 1.2.0 <= 1.6.2
F5Nginx Gateway Fabric Version >= 2.0.0 < 2.4.1
F5Nginx Ingress Controller Version >= 3.4.0 <= 3.7.2
F5Nginx Ingress Controller Version >= 4.0.0 <= 4.0.1
F5Nginx Ingress Controller Version >= 5.0.0 < 5.3.3
F5Nginx Instance Manager Version >= 2.15.1 <= 2.21.0
F5Nginx Open Source Version >= 1.3.0 < 1.28.2
F5Nginx Open Source Version >= 1.29.0 < 1.29.5
F5Nginx Plus Version >= r33 < r35
F5Nginx Plus Versionr32 Update-
F5Nginx Plus Versionr32 Updatep1
F5Nginx Plus Versionr32 Updatep2
F5Nginx Plus Versionr32 Updatep3
F5Nginx Plus Versionr33 Updatep1
F5Nginx Plus Versionr33 Updatep2
F5Nginx Plus Versionr33 Updatep3
F5Nginx Plus Versionr34 Updatep1
F5Nginx Plus Versionr34 Updatep2
F5Nginx Plus Versionr35 Update-
F5Nginx Plus Versionr36 Update-
F5Nginx Plus Versionr36 Updatep1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.033
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
f5sirt@f5.com 8.2 0 0
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
f5sirt@f5.com 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-345 Insufficient Verification of Data Authenticity

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data

The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.