Close Menu
geekfence.comgeekfence.com
    What's Hot

    For May, Patch Tuesday means 139 updates — but no zero-days – Computerworld

    May 17, 2026

    Oto Smart Sprinkler Review (2026): Solar-Powered and Simple to Use

    May 17, 2026

    There’s still time to enter the Leading Lights Awards

    May 17, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE
    Cyber Security

    NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

    AdminBy AdminMay 17, 2026No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Ravie LakshmananMay 17, 2026Server Security / Vulnerability

    NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

    A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public disclosure, according to VulnCheck.

    The vulnerability, tracked as CVE-2026-42945 (CVSS score: 9.2), is a heap buffer overflow in ngx_http_rewrite_module affecting NGINX versions 0.6.27 through 1.30.0. According to AI-native security company depthfirst, the vulnerability was introduced in 2008.

    Successful exploitation of the flaw can permit an unauthenticated attacker to crash worker processes or execute remote code with crafted HTTP requests. However, it bears noting that code execution is possible only on devices where Address Space Layout Randomization (ASLR), a safeguard against memory-based attacks, is turned off.

    “It relies on a specific NGINX config to be vulnerable, and for an attacker to know or discover the config to exploit it,” security researcher Kevin Beaumont said. “To reach RCE [remote code execution], also ASLR needs to have been disabled on the box.”

    In a similar assessment, AlmaLinux maintainers said: “Turning the heap overflow into reliable code execution is not trivial in the default configuration, and on systems with ASLR enabled (which is the default on every supported AlmaLinux release), we do not expect a generic, reliable exploit to be easy to produce.”

    “That said, ‘not easy’ is not ‘impossible,’ and the worker-crash DoS is exploitable enough on its own that we recommend treating this as urgent,” the maintainers added.

    The latest findings from VulnCheck show that threat actors have begun to weaponize the flaw, with exploitation attempts detected against its honeypot networks. The nature of the attack activity and the end goals are presently unknown. Users are advised to apply the latest fixes from F5 to secure their networks against active threats.

    Flaws in openDCIM Also Exploited

    The development comes as VulnCheck also revealed exploitation efforts targeting two critical flaws in openDCIM, an open-source application used for data center infrastructure management. The vulnerabilities, both rated 9.3 on the CVSS scoring system, are listed below –

    • CVE-2026-28515 – A missing authorization vulnerability that could allow an authenticated user to access LDAP configuration functionality regardless of their assigned privileges. In Docker deployments where REMOTE_USER is set without authentication enforcement, the endpoint may be reachable without credentials, allowing unauthorized modification of application configuration.
    • CVE-2026-28517 – An operating system command injection vulnerability impacting the “report_network_map.php” component that processes a parameter called “dot” without sanitization and passes it directly to a shell command, resulting in arbitrary code execution.

    The two vulnerabilities were discovered alongside CVE-2026-28516 (CVSS score: 9.3), an SQL injection vulnerability in openDCIM, by VulnCheck security researcher Valentin Lobstein in February 2026. According to Lobstein, the three flaws can be chained to achieve remote code execution over five HTTP requests and spawn a reverse shell.

    “The cluster of attacker activity we’re observing so far originates from a single Chinese IP and uses what appears to be a customized implementation of AI vuln discovery tool Vulnhuntr to automatically check for vulnerable installations before dropping a PHP web shell,” Caitlin Condon, vice president of security research at VulnCheck, said.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab – Krebs on Security

    May 16, 2026

    Fresh mischief and digital shenanigans

    May 15, 2026

    Apple’s iPhone Privacy Feature Expands to More Users Worldwide

    May 14, 2026

    Cisco and Red Hat are powering the intelligent core to edge

    May 13, 2026

    Russia’s secret school for hackers

    May 12, 2026

    Why Changing Passwords Doesn’t End an Active Directory Breach

    May 11, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202540 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202627 Views

    Redefining AI efficiency with extreme compression

    March 25, 202626 Views
    Don't Miss

    For May, Patch Tuesday means 139 updates — but no zero-days – Computerworld

    May 17, 2026

    Add these Microsoft updates to your standard developer update release schedule. Adobe (and third-party updates)…

    Oto Smart Sprinkler Review (2026): Solar-Powered and Simple to Use

    May 17, 2026

    There’s still time to enter the Leading Lights Awards

    May 17, 2026

    Four ways Google Research scientists have been using Empirical Research Assistance

    May 17, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    For May, Patch Tuesday means 139 updates — but no zero-days – Computerworld

    May 17, 2026

    Oto Smart Sprinkler Review (2026): Solar-Powered and Simple to Use

    May 17, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.