CVE-2026-27784

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link Resource
https://my.f5.com/manage/s/article/K000160364 Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*

History

30 Mar 2026, 13:59

Type Values Removed Values Added
CPE cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
References () https://my.f5.com/manage/s/article/K000160364 - () https://my.f5.com/manage/s/article/K000160364 - Mitigation, Vendor Advisory
First Time F5
F5 nginx Open Source

Information

Published : 2026-03-24 15:16

Updated : 2026-03-30 13:59


NVD link : CVE-2026-27784

Mitre link : CVE-2026-27784

CVE.ORG link : CVE-2026-27784


JSON object : View

Products Affected

f5

  • nginx_open_source
CWE
CWE-190

Integer Overflow or Wraparound