[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fyegGepnJ4aPhVS5Sd3pXbgUwR_Z6ejw_QH5A2vCVCPE":3},{"article":4,"iocs":41},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":28,"category":29,"article_tags":33},"72092131-732c-4da8-bc61-6603e9529ad1","F5 Patches Over 50 Vulnerabilities","f5-patches-over-50-vulnerabilities-9f7ebc","The company’s latest quarterly advisory describes high and medium-severity issues in BIG-IP, BIG-IQ, and NGINX. The post F5 Patches Over 50 Vulnerabilities appeared first on SecurityWeek.","F5 released security updates addressing 19 high-severity and 32 medium-severity vulnerabilities across BIG-IP, BIG-IQ, and NGINX. The most critical issue, CVE-2026-42945 in NGINX (CVSS 9.2), is a denial-of-service flaw in the rewrite module that can lead to code execution if ASLR is disabled. Other significant flaws include CVE-2026-41225 affecting iControl REST authentication and multiple RCE vulnerabilities requiring authentication.","F5 patches over 50 vulnerabilities in BIG-IP, BIG-IQ, and NGINX products.","F5 on Wednesday announced fixes for over 19 high-severity and 32 medium-severity vulnerabilities impacting BIG-IP, BIG-IQ, and NGINX. Based on the CVSS score, the most severe of the resolved issues is CVE-2026-42945 (CVSS v4.0 score of 9.2), a denial-of-service (DoS) condition in NGINX’s ngx_http_rewrite_module module. The bug allows an unauthenticated attacker to send crafted HTTP requests that, combined with certain conditions beyond the attacker’s control, could trigger a heap buffer overflow and a restart. If Address Space Layout Randomization (ASLR) is disabled, the flaw can be exploited for code execution. Next in line is CVE-2026-41225 (CVSS v4.0 score of 8.6), a weakness in iControl REST that could allow an authenticated attacker who has at least Manager permissions to create configuration objects, leading to command execution. “This vulnerability may allow a highly privileged attacker with network access to the affected iControl REST endpoint through the BIG-IP management port or self IP addresses to escalate their privileges or bypass Appliance mode restrictions. In appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary. There is no data plane exposure; this is a control plane issue only,” F5 explains. On Wednesday, the company also announced fixes for high-severity remote code execution (RCE) and remote command injection vulnerabilities (CVE-2026-41957, CVE-2026-34176, CVE-2026-39459) in BIG-IP that require authentication.Advertisement. Scroll to continue reading. Of the remaining high-severity flaws, one can lead to restriction bypass, another to arbitrary file tampering, and 12 to denial-of-service (DoS) conditions, mainly by causing the Traffic Management Microkernel (TMM) to terminate. The medium-severity issues that F5 addressed this week could lead to security protection bypass, privilege escalation, information disclosure, arbitrary system command execution, DoS conditions, code injection, and arbitrary local file tampering. None of these vulnerabilities appears to have been exploited in the wild. Additional information can be found in F5’s quarterly security notification. Related: High-Severity Vulnerability Patched in VMware Fusion Related: Researcher Drops YellowKey, GreenPlasma Windows Zero-Days Related: Fortinet, Ivanti Patch Critical Vulnerabilities Related: Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Researcher Drops YellowKey, GreenPlasma Windows Zero-DaysGovernment to Scrutinize Instructure Over Canvas Disruption, Data Breach716,000 Impacted by OpenLoop Health Data BreachFortinet, Ivanti Patch Critical VulnerabilitiesChipmaker Patch Tuesday: Intel and AMD Patch 70 VulnerabilitiesMicrosoft Patches 137 VulnerabilitiesAdobe Patches 52 Vulnerabilities in 10 ProductsWhite Circle Raises $11 Million for AI Control Platform Latest News Enhancing Data Center Security Without Sacrificing PerformanceNew Linux Kernel Vulnerability Fragnesia Allows Root Privilege EscalationMythos Proves Potent in Vulnerability Discovery, Less Convincing ElsewhereAkamai to Acquire AI and Browser Security Firm LayerX for $205 MillionChinese APTs Expand Targets, Update Backdoors in Recent CampaignsG7 Countries Release AI SBOM GuidanceHackers Targeted PraisonAI Vulnerability Hours After DisclosureHigh-Severity Vulnerability Patched in VMware Fusion Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveSilvio Pappalardo has joined AuthMind as Chief Revenue Officer.iCOUNTER has appointed Lisa Hayashi as CMO and Bob Kalchthaler as CFO.Thomas Bain has been appointed Chief Marketing Officer at Silent Push.More People On The MoveExpert Insights Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Ff5-patches-over-50-vulnerabilities\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2023\u002F10\u002FF5-Vulnerability.jpg","2026-05-14T10:47:58+00:00","2026-05-14T12:00:25.743293+00:00",9,[18,21,24,26],{"name":19,"type":20},"F5","vendor",{"name":22,"type":23},"BIG-IP","product",{"name":25,"type":23},"BIG-IQ",{"name":27,"type":23},"NGINX","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":28,"icon":30,"name":31,"slug":32},null,"Vulnerabilities","vulnerabilities",[34,39],{"category":35},{"id":36,"icon":30,"name":37,"slug":38},"02371804-cf6d-4449-98de-f1a2d4d9b266","Tools","tools",{"category":40},{"id":28,"icon":30,"name":31,"slug":32},[42,46,49,52,55],{"type":43,"value":44,"context":45},"cve","CVE-2026-42945","DoS in NGINX ngx_http_rewrite_module, CVSS 9.2, heap buffer overflow",{"type":43,"value":47,"context":48},"CVE-2026-41225","iControl REST privilege escalation, CVSS 8.6, requires Manager permissions",{"type":43,"value":50,"context":51},"CVE-2026-41957","BIG-IP RCE requiring authentication",{"type":43,"value":53,"context":54},"CVE-2026-34176","BIG-IP remote command injection requiring authentication",{"type":43,"value":56,"context":54},"CVE-2026-39459"]