Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-1642

Опубликовано: 04 фев. 2026
Источник: nvd
CVSS3: 5.9
EPSS Низкий

Описание

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:f5:nginx_gateway_fabric:*:*:*:*:*:*:*:*
Версия от 1.2.0 (включая) до 1.6.2 (включая)
cpe:2.3:a:f5:nginx_gateway_fabric:*:*:*:*:*:*:*:*
Версия от 2.0.0 (включая) до 2.4.1 (исключая)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*
Версия от 3.4.0 (включая) до 3.7.2 (включая)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*
Версия от 4.0.0 (включая) до 4.0.1 (включая)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*
Версия от 5.0.0 (включая) до 5.3.3 (исключая)
cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:*
Версия от 2.15.1 (включая) до 2.21.0 (включая)
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
Версия от 1.3.0 (включая) до 1.28.2 (исключая)
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
Версия от 1.29.0 (включая) до 1.29.5 (исключая)
cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*
Версия от r33 (включая) до r35 (исключая)
cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p3:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p3:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r34:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r34:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r35:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r36:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r36:p1:*:*:*:*:*:*

EPSS

Процентиль: 3%
0.00016
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-349
CWE-345

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
redhat
около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 5.9
debian
около 2 месяцев назад

A vulnerability exists in NGINX OSS and NGINX Plus when configured to ...

CVSS3: 7.5
redos
16 дней назад

Уязвимость angie

rocky
14 дней назад

Moderate: nginx:1.26 security update

EPSS

Процентиль: 3%
0.00016
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-349
CWE-345