Skip to main content

CVE-2022-41743: CWE-787 Out-of-bounds Write in F5 NGINX Plus

High
VulnerabilityCVE-2022-41743cvecve-2022-41743cwe-787
Published: Wed Oct 19 2022 (10/19/2022, 21:21:29 UTC)
Source: CVE
Vendor/Project: F5
Product: NGINX Plus

Description

NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_hls_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its crash or potential other impact using a specially crafted audio or video file. The issue affects only NGINX Plus when the hls directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_hls_module.

AI-Powered Analysis

AILast updated: 07/05/2025, 05:27:36 UTC

Technical Analysis

CVE-2022-41743 is a high-severity vulnerability identified in F5's NGINX Plus software, specifically affecting versions prior to R27 P1 and R26 P1. The vulnerability is classified as a CWE-787 Out-of-bounds Write within the ngx_http_hls_module, which is responsible for handling HTTP Live Streaming (HLS) media content. This flaw allows a local attacker to exploit the module by supplying a specially crafted audio or video file that triggers improper memory handling, leading to corruption of the NGINX worker process memory. The consequence of this memory corruption can range from a denial-of-service condition due to worker crashes to potentially more severe impacts such as arbitrary code execution or privilege escalation, although the exact extent beyond crashes is not explicitly confirmed. Exploitation requires that the vulnerable NGINX Plus instance is configured with the hls directive enabled, and the attacker must have the ability to cause the server to process the malicious media file locally. The CVSS v3.1 score of 7.0 reflects the vulnerability's high impact on confidentiality, integrity, and availability, but with limited attack vector (local), high attack complexity, and requiring low privileges without user interaction. No known exploits have been reported in the wild to date, but the vulnerability's nature and impact warrant prompt attention and remediation by affected organizations.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those deploying NGINX Plus with HLS streaming enabled, such as media companies, content delivery networks, and enterprises using video/audio streaming internally or externally. Successful exploitation could disrupt critical streaming services, leading to denial of service and potential data integrity issues. Given the high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to compromise server stability or potentially execute arbitrary code if further exploitation techniques are developed. This could result in service outages, reputational damage, and regulatory compliance issues under GDPR if personal data is affected. The requirement for local access or ability to trigger processing of crafted media files limits remote exploitation but does not eliminate risk, especially in environments where untrusted users can upload or influence media content. European organizations with stringent uptime and data protection requirements must prioritize patching to maintain service continuity and security.

Mitigation Recommendations

1. Immediate upgrade of NGINX Plus to versions R27 P1 or R26 P1 or later where the vulnerability is patched. 2. Review and restrict the use of the hls directive in configurations; disable it if HLS streaming is not required. 3. Implement strict access controls to limit who can upload or influence media content processed by the server, minimizing the risk of malicious file submission. 4. Employ file validation and scanning mechanisms on media uploads to detect and block malformed or suspicious audio/video files. 5. Monitor NGINX worker processes for crashes or abnormal behavior that could indicate exploitation attempts. 6. Use network segmentation and least privilege principles to reduce the attack surface and limit local attacker capabilities. 7. Maintain up-to-date intrusion detection and prevention systems capable of recognizing anomalous activity related to media processing. These steps go beyond generic advice by focusing on configuration hardening, access control, and proactive detection tailored to the specifics of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2022-09-28T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd830c

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 5:27:36 AM

Last updated: 8/16/2025, 6:20:38 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats