Exploitation of Critical NGINX Vulnerability Begins
Active in-the-wild exploitation of critical NGINX heap buffer overflow CVE-2026-42945 begins days after patch release.
Summary
A critical heap buffer overflow vulnerability (CVE-2026-42945, CVSS 9.2) in NGINX's ngx_http_rewrite_module, lurking for 16 years, is now being actively exploited in the wild just days after F5 released patches. The flaw causes denial-of-service on default configurations and remote code execution if ASLR is disabled. VulnCheck reports active exploitation via crafted HTTP requests on vulnerable deployments, with roughly 5.7M internet-exposed NGINX servers potentially at risk.
Full text
The first in-the-wild attacks exploiting a critical-severity NGINX vulnerability patched last week have occurred over the weekend, VulnCheck warns. Tracked as CVE-2026-42945 (CVSS score of 9.2) and dubbed Nginx Rift, the flaw is described as a heap buffer overflow in the ngx_http_rewrite_module component. It lurked in the NGINX code for 16 years. Shortly after F5 released patches for the bug, Depthfirst published technical details and proof-of-concept (PoC) code targeting it. Now, VulnCheck says threat actors are already exploiting the issue in attacks. “We’re seeing active exploitation of CVE-2026-42945 in F5 NGINX, a heap buffer overflow affecting both NGINX Plus and NGINX Open Source on VulnCheck Canaries just days after the CVE was published,” VulnCheck researcher Patrick Garrity warned. The security defect exists because the script engine relies on a two-pass process to calculate the buffer size and copy data to it, and because the internal engine state changes between these passes. In certain conditions, an unpropagated flag results in attacker-supplied data being written past the heap boundary. On default deployments, successful exploitation of the CVE would trigger a server restart, causing a denial-of-service (DoS) condition. If Address Space Layout Randomization (ASLR) is disabled, the vulnerability can lead to remote code execution (RCE).Advertisement. Scroll to continue reading. As VulnCheck points out, the bug can be exploited remotely, without authentication, via crafted HTTP requests, but requires a specific rewrite configuration. While crashing the NGINX worker process is fairly trivial with a single crafted request, achieving RCE is more difficult, as most deployments have ASLR enabled by default. “Our Censys query surfaces roughly 5.7M internet-exposed NGINX servers running a potentially vulnerable version, though the truly exploitable population is likely to be a much smaller subset of those,” VulnCheck says. The vulnerability demands urgent attention, security researchers warn. Wider exploitation attempts against vulnerable deployments are to be expected, especially since the public PoC can be used to disable ASLR and achieve RCE. Related: Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild Related: Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026 Related: New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks Related: Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Chinese APTs Expand Targets, Update Backdoors in Recent CampaignsF5 Patches Over 50 VulnerabilitiesHackers Targeted PraisonAI Vulnerability Hours After DisclosureResearcher Drops YellowKey, GreenPlasma Windows Zero-DaysGovernment to Scrutinize Instructure Over Canvas Disruption, Data Breach716,000 Impacted by OpenLoop Health Data BreachFortinet, Ivanti Patch Critical VulnerabilitiesChipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities Latest News Hackers Earn $1.3 Million at Pwn2Own Berlin 2026 PoC Code Published for Critical NGINX VulnerabilityIn Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App FlawsMicrosoft Warns of Exchange Server Zero-Day Exploited in the WildAmerican Lending Center Data Breach Affects 123,000 IndividualsOpenAI Hit by TanStack Supply Chain AttackTeamPCP Ups the Game, Releases Shai-Hulud Worm’s Source CodeChrome 148 Update Patches Critical Vulnerabilities Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveTim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.IRONSCALES has named Steve McKenzie as Chief Operating Officer.Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.More People On The MoveExpert Insights Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2026-42945