Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41743: CWE-787 Out-of-bounds Write in F5 NGINX Plus

0
High
VulnerabilityCVE-2022-41743cvecve-2022-41743cwe-787
Published: Wed Oct 19 2022 (10/19/2022, 21:21:29 UTC)
Source: CVE
Vendor/Project: F5
Product: NGINX Plus

Description

NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_hls_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its crash or potential other impact using a specially crafted audio or video file. The issue affects only NGINX Plus when the hls directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_hls_module.

AI-Powered Analysis

AILast updated: 07/05/2025, 05:27:36 UTC

Technical Analysis

CVE-2022-41743 is a high-severity vulnerability identified in F5's NGINX Plus software, specifically affecting versions prior to R27 P1 and R26 P1. The vulnerability is classified as a CWE-787 Out-of-bounds Write within the ngx_http_hls_module, which is responsible for handling HTTP Live Streaming (HLS) media content. This flaw allows a local attacker to exploit the module by supplying a specially crafted audio or video file that triggers improper memory handling, leading to corruption of the NGINX worker process memory. The consequence of this memory corruption can range from a denial-of-service condition due to worker crashes to potentially more severe impacts such as arbitrary code execution or privilege escalation, although the exact extent beyond crashes is not explicitly confirmed. Exploitation requires that the vulnerable NGINX Plus instance is configured with the hls directive enabled, and the attacker must have the ability to cause the server to process the malicious media file locally. The CVSS v3.1 score of 7.0 reflects the vulnerability's high impact on confidentiality, integrity, and availability, but with limited attack vector (local), high attack complexity, and requiring low privileges without user interaction. No known exploits have been reported in the wild to date, but the vulnerability's nature and impact warrant prompt attention and remediation by affected organizations.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those deploying NGINX Plus with HLS streaming enabled, such as media companies, content delivery networks, and enterprises using video/audio streaming internally or externally. Successful exploitation could disrupt critical streaming services, leading to denial of service and potential data integrity issues. Given the high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to compromise server stability or potentially execute arbitrary code if further exploitation techniques are developed. This could result in service outages, reputational damage, and regulatory compliance issues under GDPR if personal data is affected. The requirement for local access or ability to trigger processing of crafted media files limits remote exploitation but does not eliminate risk, especially in environments where untrusted users can upload or influence media content. European organizations with stringent uptime and data protection requirements must prioritize patching to maintain service continuity and security.

Mitigation Recommendations

1. Immediate upgrade of NGINX Plus to versions R27 P1 or R26 P1 or later where the vulnerability is patched. 2. Review and restrict the use of the hls directive in configurations; disable it if HLS streaming is not required. 3. Implement strict access controls to limit who can upload or influence media content processed by the server, minimizing the risk of malicious file submission. 4. Employ file validation and scanning mechanisms on media uploads to detect and block malformed or suspicious audio/video files. 5. Monitor NGINX worker processes for crashes or abnormal behavior that could indicate exploitation attempts. 6. Use network segmentation and least privilege principles to reduce the attack surface and limit local attacker capabilities. 7. Maintain up-to-date intrusion detection and prevention systems capable of recognizing anomalous activity related to media processing. These steps go beyond generic advice by focusing on configuration hardening, access control, and proactive detection tailored to the specifics of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2022-09-28T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd830c

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 5:27:36 AM

Last updated: 2/7/2026, 1:29:43 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats