CVE-2026-32647: CWE-125 Out-of-bounds Read in F5 NGINX Open Source
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2026-32647 is a vulnerability classified under CWE-125 (Out-of-bounds Read) found in the ngx_http_mp4_module of F5's NGINX Open Source and NGINX Plus products. This module is responsible for handling MP4 streaming functionality. The flaw arises when the module processes a specially crafted MP4 file, leading to a buffer over-read or over-write in the memory space of the NGINX worker process. This memory corruption can cause the worker process to crash, resulting in denial of service, or potentially allow an attacker to execute arbitrary code within the context of the NGINX worker. The vulnerability is exploitable only if the ngx_http_mp4_module is compiled into NGINX and the mp4 directive is actively used in the server configuration, limiting the attack surface to deployments utilizing MP4 streaming features. The attack vector requires local access or the ability to cause NGINX to process the malicious MP4 file, which implies that remote exploitation is possible if the server accepts MP4 file uploads or requests that trigger the module. The CVSS v3.1 base score of 7.8 indicates a high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, and the vulnerability affects versions 1.29.0 and 1.1.19 of NGINX. End-of-support versions are not evaluated. The lack of patches linked suggests that fixes may be forthcoming or that users should monitor vendor advisories closely.
Potential Impact
The vulnerability poses a significant risk to organizations using NGINX with the ngx_http_mp4_module enabled, particularly those streaming MP4 content. Successful exploitation can lead to denial of service through worker process crashes, disrupting web services and potentially causing downtime. More critically, the possibility of arbitrary code execution could allow attackers to escalate privileges, execute malicious payloads, or pivot within the network, compromising confidentiality and integrity of data. Given NGINX's widespread use as a web server and reverse proxy, especially in media streaming and content delivery environments, the impact could be substantial. Organizations relying on MP4 streaming may face service outages or breaches if attackers exploit this flaw. Although no known exploits are currently in the wild, the high CVSS score and potential for code execution warrant urgent attention. The requirement for local or controlled access to trigger the vulnerability somewhat limits remote exploitation but does not eliminate risk, especially in multi-tenant or cloud environments where attackers might upload malicious MP4 files. The vulnerability could also be leveraged in targeted attacks against high-value assets using NGINX for media delivery.
Mitigation Recommendations
Organizations should first verify whether their NGINX deployments include the ngx_http_mp4_module and if the mp4 directive is enabled in their configurations. If so, they should prioritize updating to a patched version once released by F5 or NGINX. In the absence of immediate patches, mitigating controls include disabling the ngx_http_mp4_module or removing the mp4 directive if MP4 streaming is not essential. Implement strict input validation and filtering on MP4 file uploads or requests to prevent processing of malformed files. Employ network segmentation and access controls to restrict who can upload or trigger MP4 processing. Monitoring and logging of NGINX worker crashes or unusual behavior can provide early detection of exploitation attempts. Additionally, running NGINX with the least privileges necessary and using containerization or sandboxing can limit the impact of potential code execution. Regularly review vendor advisories for patches and apply them promptly. Finally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious MP4 payloads targeting this module.
Affected Countries
United States, Germany, China, Japan, United Kingdom, France, South Korea, India, Canada, Australia
CVE-2026-32647: CWE-125 Out-of-bounds Read in F5 NGINX Open Source
Description
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32647 is a vulnerability classified under CWE-125 (Out-of-bounds Read) found in the ngx_http_mp4_module of F5's NGINX Open Source and NGINX Plus products. This module is responsible for handling MP4 streaming functionality. The flaw arises when the module processes a specially crafted MP4 file, leading to a buffer over-read or over-write in the memory space of the NGINX worker process. This memory corruption can cause the worker process to crash, resulting in denial of service, or potentially allow an attacker to execute arbitrary code within the context of the NGINX worker. The vulnerability is exploitable only if the ngx_http_mp4_module is compiled into NGINX and the mp4 directive is actively used in the server configuration, limiting the attack surface to deployments utilizing MP4 streaming features. The attack vector requires local access or the ability to cause NGINX to process the malicious MP4 file, which implies that remote exploitation is possible if the server accepts MP4 file uploads or requests that trigger the module. The CVSS v3.1 base score of 7.8 indicates a high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, and the vulnerability affects versions 1.29.0 and 1.1.19 of NGINX. End-of-support versions are not evaluated. The lack of patches linked suggests that fixes may be forthcoming or that users should monitor vendor advisories closely.
Potential Impact
The vulnerability poses a significant risk to organizations using NGINX with the ngx_http_mp4_module enabled, particularly those streaming MP4 content. Successful exploitation can lead to denial of service through worker process crashes, disrupting web services and potentially causing downtime. More critically, the possibility of arbitrary code execution could allow attackers to escalate privileges, execute malicious payloads, or pivot within the network, compromising confidentiality and integrity of data. Given NGINX's widespread use as a web server and reverse proxy, especially in media streaming and content delivery environments, the impact could be substantial. Organizations relying on MP4 streaming may face service outages or breaches if attackers exploit this flaw. Although no known exploits are currently in the wild, the high CVSS score and potential for code execution warrant urgent attention. The requirement for local or controlled access to trigger the vulnerability somewhat limits remote exploitation but does not eliminate risk, especially in multi-tenant or cloud environments where attackers might upload malicious MP4 files. The vulnerability could also be leveraged in targeted attacks against high-value assets using NGINX for media delivery.
Mitigation Recommendations
Organizations should first verify whether their NGINX deployments include the ngx_http_mp4_module and if the mp4 directive is enabled in their configurations. If so, they should prioritize updating to a patched version once released by F5 or NGINX. In the absence of immediate patches, mitigating controls include disabling the ngx_http_mp4_module or removing the mp4 directive if MP4 streaming is not essential. Implement strict input validation and filtering on MP4 file uploads or requests to prevent processing of malformed files. Employ network segmentation and access controls to restrict who can upload or trigger MP4 processing. Monitoring and logging of NGINX worker crashes or unusual behavior can provide early detection of exploitation attempts. Additionally, running NGINX with the least privileges necessary and using containerization or sandboxing can limit the impact of potential code execution. Regularly review vendor advisories for patches and apply them promptly. Finally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious MP4 payloads targeting this module.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- f5
- Date Reserved
- 2026-03-18T16:06:38.427Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2a3a3f4197a8e3b3ed94d
Added to database: 3/24/2026, 2:45:55 PM
Last enriched: 3/24/2026, 3:06:13 PM
Last updated: 3/26/2026, 5:32:19 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.