The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
| Link | Resource |
|---|---|
| https://my.f5.com/manage/s/article/K000160364 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Mar 2026, 13:59
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:* | |
| References | () https://my.f5.com/manage/s/article/K000160364 - Mitigation, Vendor Advisory | |
| First Time |
F5
F5 nginx Open Source |
Information
Published : 2026-03-24 15:16
Updated : 2026-03-30 13:59
NVD link : CVE-2026-27784
Mitre link : CVE-2026-27784
CVE.ORG link : CVE-2026-27784
JSON object : View
Products Affected
f5
- nginx_open_source
CWE
CWE-190
Integer Overflow or Wraparound
