Exploitation of Critical NGINX Vulnerability Begins Days After Patch ReleaseExploitation of Critical NGINX Vulnerability Begins Days After Patch Release

Related

New GhostLock Tool Abuses Windows API to Block File Access

What happened A security researcher has published a proof-of-concept tool...

Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks

What happened Ivanti has disclosed a high-severity remote code execution...

Mirai-Based xlabs_v1 Botnet Exploits Android Debug Bridge to Hijack IoT Devices

What happened Hunt.io researchers have identified a new Mirai-derived botnet...

Cisco Releases Fix for DoS Flaw That Requires Manual Reboot to Recover

What happened Cisco has released security updates addressing a high-severity...

Palo Alto Networks Warns of Firewall RCE Zero-Day Exploited in Attacks

What happened Palo Alto Networks has disclosed a critical unpatched...

Share

What happened

Active exploitation of a critical NGINX vulnerability tracked as CVE-2026-42945 and dubbed Nginx Rift has been confirmed by VulnCheck, just days after F5 released patches and PoC code was published. The vulnerability, a heap buffer overflow in the ngx_http_rewrite_module component, carries a CVSS score of 9.2 and had been present in NGINX code for 16 years.

The flaw exists because NGINX’s script engine uses a two-pass process to calculate buffer size and copy data, and the internal engine state changes between these passes. In certain conditions, an unpropagated flag results in attacker-supplied data being written past the heap boundary. Exploitation requires no authentication and can be triggered remotely via crafted HTTP requests, but does require a specific rewrite configuration to be exploitable.

On default deployments with ASLR enabled, successful exploitation crashes the NGINX worker process and triggers a server restart, causing a denial-of-service condition. If ASLR is disabled, the vulnerability enables remote code execution. Security researchers have warned that public PoC code can be used to disable ASLR and achieve RCE, raising concern about broader exploitation capability. VulnCheck identified approximately 5.7 million internet-exposed NGINX servers running potentially vulnerable versions through Censys, though the truly exploitable population is assessed as a smaller subset given the rewrite configuration requirement.

Who is affected

Organizations running NGINX Plus and NGINX Open Source on vulnerable versions with internet-exposed instances and rewrite configurations are directly exposed. The 5.7 million potentially vulnerable instances identified by VulnCheck represents a broad attack surface across web servers, reverse proxies, and load balancers running NGINX globally.

Why CISOs should care

Nginx Rift follows the now-familiar pattern of rapid exploitation following PoC publication. The flaw sat undetected for 16 years, was patched, had PoC code published within days, and exploitation began almost immediately. The DoS impact on default configurations is immediately relevant for any organization where NGINX availability is business-critical, while the RCE potential on systems with ASLR disabled represents a higher-severity risk for legacy or misconfigured deployments.

With 5.7 million potentially vulnerable internet-exposed instances and active exploitation already confirmed, the window for proactive patching ahead of broad opportunistic attacks is narrow.

3 practical actions

  1. Patch NGINX Plus and NGINX Open Source immediately to the versions released by F5 last week: Active exploitation is confirmed and PoC code is public. Treat this as an emergency patch regardless of whether your rewrite configuration is currently known to be exploitable, as configuration audits should not delay patching.
  2. Audit NGINX rewrite configurations across your environment to assess exploitability: The vulnerability requires a specific rewrite configuration to trigger. Identify all NGINX instances using ngx_http_rewrite_module directives and prioritize those for immediate patching, while ensuring all instances receive the patch regardless of current configuration.
  3. Confirm ASLR is enabled on all systems running NGINX: ASLR is the primary mitigation against RCE escalation from this vulnerability. Verify that ASLR is enabled at the operating system level on all servers running NGINX, and treat any instance with ASLR disabled as a critical patching priority given the confirmed RCE potential in that configuration.
IMG 0514 2
+ posts

John Kevin Hao is a news and feature writer covering cybersecurity, technology, and business targeted for professional audiences.