Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27651: CWE-476 NULL Pointer Dereference in F5 NGINX Open Source

0
High
VulnerabilityCVE-2026-27651cvecve-2026-27651cwe-476
Published: Tue Mar 24 2026 (03/24/2026, 14:13:27 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: NGINX Open Source

Description

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 15:09:00 UTC

Technical Analysis

CVE-2026-27651 is a NULL pointer dereference vulnerability classified under CWE-476 affecting F5's NGINX Open Source and NGINX Plus products. The flaw exists in the ngx_mail_auth_http_module, which handles mail authentication via HTTP. When this module is enabled and configured to use CRAM-MD5 or APOP authentication, an attacker can send crafted requests that cause the worker process to dereference a NULL pointer. This condition arises when the authentication server responds with an Auth-Wait header, indicating the client should retry authentication. The improper handling of this response leads to a crash of the worker process, resulting in denial of service. The vulnerability affects versions 0.5.15 and 1.29.0 of NGINX Open Source, with no patches currently linked. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. No known exploits have been reported in the wild as of the publication date. The issue does not affect versions beyond those listed or those that have reached End of Technical Support. This vulnerability is particularly relevant for deployments using mail proxy features with HTTP-based authentication and the specified authentication mechanisms.

Potential Impact

The primary impact of CVE-2026-27651 is denial of service caused by worker process crashes in NGINX servers configured with the vulnerable module and authentication methods. This can lead to service outages for mail proxy services relying on NGINX, affecting email delivery and authentication workflows. Organizations running affected versions may experience degraded availability, potentially disrupting business communications and dependent applications. Since exploitation requires no authentication and can be performed remotely, attackers can easily trigger the vulnerability to cause repeated crashes, amplifying the denial of service effect. While confidentiality and integrity are not directly impacted, the loss of availability can have cascading operational consequences, including loss of customer trust and potential financial losses. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits given the public disclosure.

Mitigation Recommendations

To mitigate CVE-2026-27651, organizations should first verify if the ngx_mail_auth_http_module is enabled and if CRAM-MD5 or APOP authentication methods are in use. If possible, temporarily disable the vulnerable module or switch to alternative authentication methods that do not trigger the vulnerability. Monitor authentication server responses to ensure they do not return the Auth-Wait header, or configure the server to avoid permitting retries in this manner. Apply any available patches or updates from F5 or NGINX as soon as they are released. Implement robust monitoring of NGINX worker processes to detect crashes and automate failover or restart mechanisms to minimize downtime. Additionally, consider deploying network-level protections such as rate limiting or filtering to reduce the risk of repeated exploitation attempts. Regularly review and update configurations to align with security best practices for mail proxy authentication.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
f5
Date Reserved
2026-03-18T16:06:38.454Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2a3a3f4197a8e3b3ed938

Added to database: 3/24/2026, 2:45:55 PM

Last enriched: 3/24/2026, 3:09:00 PM

Last updated: 3/26/2026, 5:31:45 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses