Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27784: CWE-190 Integer Overflow or Wraparound in F5 NGINX Open Source

0
High
VulnerabilityCVE-2026-27784cvecve-2026-27784cwe-190
Published: Tue Mar 24 2026 (03/24/2026, 14:13:25 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: NGINX Open Source

Description

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 15:08:19 UTC

Technical Analysis

CVE-2026-27784 is an integer overflow vulnerability classified under CWE-190 found in the 32-bit builds of F5's NGINX Open Source web server, specifically in the ngx_http_mp4_module. This module handles MP4 file streaming and is enabled via the mp4 directive in the server configuration. The vulnerability arises due to improper handling of integer values when processing MP4 files, leading to an overflow or wraparound condition. This flaw can cause the server to read or write beyond allocated memory boundaries, corrupting worker process memory. The consequences include potential termination of the NGINX worker process (denial of service) or, in worst cases, arbitrary code execution if an attacker crafts a malicious MP4 file and triggers its processing. The vulnerability is limited to 32-bit versions of NGINX Open Source that include the ngx_http_mp4_module and have the mp4 directive enabled, affecting versions 1.29.0 and 1.1.19. Exploitation requires the attacker to have at least low-level privileges to deliver the crafted MP4 file to the server for processing, but no user interaction is necessary. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or exploits are currently publicly available, and versions beyond End of Technical Support are not evaluated. This vulnerability highlights the risks of integer overflow errors in media processing modules within web servers, especially on legacy 32-bit platforms.

Potential Impact

The primary impact of CVE-2026-27784 is the potential for denial of service through termination of NGINX worker processes, which can disrupt web services relying on the affected server. More critically, the memory corruption caused by the integer overflow could be leveraged for arbitrary code execution, allowing attackers to compromise server integrity and confidentiality. Organizations running 32-bit NGINX Open Source with the ngx_http_mp4_module enabled are at risk of service outages and potential full system compromise if exploited. Given the widespread use of NGINX in web infrastructure, affected deployments could face significant operational disruptions, data breaches, and reputational damage. The requirement for local access or the ability to deliver a crafted MP4 file limits remote exploitation but does not eliminate risk, especially in environments where attackers can upload or influence media content. The lack of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation. Legacy 32-bit systems are particularly vulnerable, and organizations relying on such architectures face increased risk due to limited vendor support and patch availability.

Mitigation Recommendations

To mitigate CVE-2026-27784, organizations should first verify if their NGINX Open Source deployment is 32-bit and includes the ngx_http_mp4_module with the mp4 directive enabled. If so, immediate steps include disabling the mp4 directive or the entire ngx_http_mp4_module if MP4 streaming is not essential. For environments requiring MP4 streaming, consider upgrading to a 64-bit version of NGINX Open Source where this vulnerability does not apply. Monitor vendor communications for official patches or updates addressing this issue and apply them promptly once available. Implement strict file upload controls and validation to prevent untrusted or malformed MP4 files from being processed by the server. Employ application-layer firewalls or media scanning tools to detect and block suspicious MP4 files. Additionally, restrict local access and privileges to minimize the ability of attackers to deliver crafted files. Regularly audit and update server configurations to remove unnecessary modules and directives, reducing the attack surface. Finally, consider migrating legacy 32-bit systems to supported 64-bit platforms to benefit from improved security and vendor support.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
f5
Date Reserved
2026-03-18T16:06:38.416Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2a3a3f4197a8e3b3ed93e

Added to database: 3/24/2026, 2:45:55 PM

Last enriched: 3/24/2026, 3:08:19 PM

Last updated: 3/26/2026, 5:34:38 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses