CVE-2024-7347: CWE-126: Buffer Over-read in F5 NGINX Open Source
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2024-7347 is a buffer over-read vulnerability classified under CWE-126, discovered in the ngx_http_mp4_module of F5's NGINX Open Source and NGINX Plus products. This module is responsible for handling MP4 video streaming by parsing MP4 files to enable features like pseudo-streaming. The vulnerability arises when the module processes a specially crafted MP4 file, causing it to read beyond the allocated buffer boundaries in the worker process memory. This over-read can lead to the termination of the affected NGINX worker process, resulting in a denial of service (DoS) condition. The vulnerability requires that NGINX be compiled with the ngx_http_mp4_module and that the mp4 directive is actively used in the server configuration. Exploitation requires an attacker to have low-level privileges (local access) to supply the malicious MP4 file for processing. The CVSS v3.1 base score is 4.7, reflecting a medium severity level, with an attack vector classified as local (AV:L), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or exploits are currently reported, and versions that have reached end of technical support are excluded from evaluation. This vulnerability primarily impacts environments where NGINX is used for MP4 streaming or media delivery and configured accordingly.
Potential Impact
For European organizations, the primary impact of CVE-2024-7347 is the potential for denial of service on web servers running vulnerable NGINX configurations with the ngx_http_mp4_module enabled. This can disrupt media streaming services, degrade user experience, and potentially affect business continuity for companies relying on NGINX for video content delivery. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely. However, service availability interruptions can lead to reputational damage and financial losses, especially for media companies, content delivery networks, and enterprises providing video streaming services. Organizations with public-facing NGINX servers that handle MP4 content are at higher risk. The requirement for local access to exploit the vulnerability somewhat limits the attack surface, but insider threats or attackers who have gained limited access could leverage this flaw to cause service outages. Given the widespread use of NGINX in Europe, particularly in technology, media, and telecommunications sectors, the impact could be significant if unmitigated.
Mitigation Recommendations
To mitigate CVE-2024-7347, European organizations should first identify if their NGINX deployments are built with the ngx_http_mp4_module and if the mp4 directive is enabled in the configuration. If so, immediate steps include: 1) Restrict local access to NGINX servers to trusted personnel only, minimizing the risk of local exploitation. 2) Monitor and audit logs for unusual MP4 file processing requests or worker process crashes that could indicate exploitation attempts. 3) Implement strict input validation and filtering on MP4 files uploaded or processed by the server to prevent malicious files from being handled. 4) Consider disabling the ngx_http_mp4_module or the mp4 directive if MP4 streaming is not required, reducing the attack surface. 5) Stay updated with F5 and NGINX vendor advisories for official patches or updates addressing this vulnerability and apply them promptly once available. 6) Employ containerization or sandboxing techniques for media processing to isolate potential crashes and prevent broader service disruption. 7) Use web application firewalls (WAFs) with custom rules to detect and block suspicious MP4 payloads targeting this vulnerability. These targeted mitigations go beyond generic advice by focusing on configuration auditing, access control, and proactive monitoring specific to the vulnerable module and its usage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2024-7347: CWE-126: Buffer Over-read in F5 NGINX Open Source
Description
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2024-7347 is a buffer over-read vulnerability classified under CWE-126, discovered in the ngx_http_mp4_module of F5's NGINX Open Source and NGINX Plus products. This module is responsible for handling MP4 video streaming by parsing MP4 files to enable features like pseudo-streaming. The vulnerability arises when the module processes a specially crafted MP4 file, causing it to read beyond the allocated buffer boundaries in the worker process memory. This over-read can lead to the termination of the affected NGINX worker process, resulting in a denial of service (DoS) condition. The vulnerability requires that NGINX be compiled with the ngx_http_mp4_module and that the mp4 directive is actively used in the server configuration. Exploitation requires an attacker to have low-level privileges (local access) to supply the malicious MP4 file for processing. The CVSS v3.1 base score is 4.7, reflecting a medium severity level, with an attack vector classified as local (AV:L), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or exploits are currently reported, and versions that have reached end of technical support are excluded from evaluation. This vulnerability primarily impacts environments where NGINX is used for MP4 streaming or media delivery and configured accordingly.
Potential Impact
For European organizations, the primary impact of CVE-2024-7347 is the potential for denial of service on web servers running vulnerable NGINX configurations with the ngx_http_mp4_module enabled. This can disrupt media streaming services, degrade user experience, and potentially affect business continuity for companies relying on NGINX for video content delivery. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely. However, service availability interruptions can lead to reputational damage and financial losses, especially for media companies, content delivery networks, and enterprises providing video streaming services. Organizations with public-facing NGINX servers that handle MP4 content are at higher risk. The requirement for local access to exploit the vulnerability somewhat limits the attack surface, but insider threats or attackers who have gained limited access could leverage this flaw to cause service outages. Given the widespread use of NGINX in Europe, particularly in technology, media, and telecommunications sectors, the impact could be significant if unmitigated.
Mitigation Recommendations
To mitigate CVE-2024-7347, European organizations should first identify if their NGINX deployments are built with the ngx_http_mp4_module and if the mp4 directive is enabled in the configuration. If so, immediate steps include: 1) Restrict local access to NGINX servers to trusted personnel only, minimizing the risk of local exploitation. 2) Monitor and audit logs for unusual MP4 file processing requests or worker process crashes that could indicate exploitation attempts. 3) Implement strict input validation and filtering on MP4 files uploaded or processed by the server to prevent malicious files from being handled. 4) Consider disabling the ngx_http_mp4_module or the mp4 directive if MP4 streaming is not required, reducing the attack surface. 5) Stay updated with F5 and NGINX vendor advisories for official patches or updates addressing this vulnerability and apply them promptly once available. 6) Employ containerization or sandboxing techniques for media processing to isolate potential crashes and prevent broader service disruption. 7) Use web application firewalls (WAFs) with custom rules to detect and block suspicious MP4 payloads targeting this vulnerability. These targeted mitigations go beyond generic advice by focusing on configuration auditing, access control, and proactive monitoring specific to the vulnerable module and its usage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- f5
- Date Reserved
- 2024-07-31T17:59:09.786Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091a47c28fd46ded81cf24
Added to database: 11/3/2025, 9:10:31 PM
Last enriched: 11/4/2025, 1:00:32 AM
Last updated: 11/5/2025, 2:17:09 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.