NGINX Plus and NGINX Vulnerabilities
Summary
CERT-Bund has issued a security advisory regarding multiple vulnerabilities in NGINX and NGINX Plus, with a CVSS base score of 8.2. The vulnerabilities affect Linux, UNIX, and Windows operating systems and can be exploited remotely to cause denial of service, data manipulation, bypass security measures, and potentially execute arbitrary code.
What changed
CERT-Bund has released a security advisory (WID-SEC-2026-0860) detailing critical vulnerabilities affecting NGINX and NGINX Plus web server software. The advisory highlights a CVSS base score of 8.2, indicating a high severity. The vulnerabilities impact versions of NGINX Plus prior to R36 P3, R35 P2, and R32 P5, as well as NGINX versions prior to 1.29.7 and 1.28.3, across Linux, UNIX, and Windows operating systems.
Exploitation of these vulnerabilities could allow a remote attacker to perform a denial-of-service attack, manipulate data, bypass security controls, and potentially execute arbitrary code. Organizations using affected versions of NGINX or NGINX Plus should consult the advisory for specific mitigation strategies and apply available patches or updates to prevent potential security breaches. The advisory notes that mitigation is available, implying that patching or configuration changes can address the risks.
What to do next
- Review NGINX and NGINX Plus versions against advisory WID-SEC-2026-0860
- Apply available patches or mitigation strategies for affected versions
- Monitor for further updates from CERT-Bund and NGINX
Source document (simplified)
[WID-SEC-2026-0860] NGINX und NGINX Plus: Mehrere Schwachstellen CVSS Base Score 8.2 (hoch) CVSS Temporal Score 7.1 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- UNIX
- Windows
Produktbeschreibung
NGINX Plus ist die kommerzielle Variante von NGINX, einer Webserver-, Reverse Proxy- und E-Mail Proxy Software.
NGINX ist eine Webserver-, Reverse Proxy- und E-Mail-Proxy Software.
Produkte
24.03.2026
- NGINX NGINX Plus <R36 P3
NGINX NGINX Plus <R35 P2
NGINX NGINX Plus <R32 P5
NGINX NGINX <1.29.7
NGINX NGINX <1.28.3
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in NGINX Plus und NGINX ausnutzen, um einen Denial of Service Angriff durchzuführen, um Daten zu manipulieren, um Sicherheitsvorkehrungen zu umgehen, und potenziell um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.