Changeflow GovPing Data Privacy & Cybersecurity NGINX Plus and NGINX Vulnerabilities
Priority review Notice Amended Final

NGINX Plus and NGINX Vulnerabilities

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 24th, 2026
Detected March 25th, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in NGINX and NGINX Plus, with a CVSS base score of 8.2. The vulnerabilities affect Linux, UNIX, and Windows operating systems and can be exploited remotely to cause denial of service, data manipulation, bypass security measures, and potentially execute arbitrary code.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0860) detailing critical vulnerabilities affecting NGINX and NGINX Plus web server software. The advisory highlights a CVSS base score of 8.2, indicating a high severity. The vulnerabilities impact versions of NGINX Plus prior to R36 P3, R35 P2, and R32 P5, as well as NGINX versions prior to 1.29.7 and 1.28.3, across Linux, UNIX, and Windows operating systems.

Exploitation of these vulnerabilities could allow a remote attacker to perform a denial-of-service attack, manipulate data, bypass security controls, and potentially execute arbitrary code. Organizations using affected versions of NGINX or NGINX Plus should consult the advisory for specific mitigation strategies and apply available patches or updates to prevent potential security breaches. The advisory notes that mitigation is available, implying that patching or configuration changes can address the risks.

What to do next

  1. Review NGINX and NGINX Plus versions against advisory WID-SEC-2026-0860
  2. Apply available patches or mitigation strategies for affected versions
  3. Monitor for further updates from CERT-Bund and NGINX

Source document (simplified)

[WID-SEC-2026-0860] NGINX und NGINX Plus: Mehrere Schwachstellen CVSS Base Score 8.2 (hoch) CVSS Temporal Score 7.1 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • UNIX
  • Windows

Produktbeschreibung

NGINX Plus ist die kommerzielle Variante von NGINX, einer Webserver-, Reverse Proxy- und E-Mail Proxy Software.
NGINX ist eine Webserver-, Reverse Proxy- und E-Mail-Proxy Software.

Produkte

24.03.2026
- NGINX NGINX Plus <R36 P3

  • NGINX NGINX Plus <R35 P2

  • NGINX NGINX Plus <R32 P5

  • NGINX NGINX <1.29.7

  • NGINX NGINX <1.28.3

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in NGINX Plus und NGINX ausnutzen, um einen Denial of Service Angriff durchzuführen, um Daten zu manipulieren, um Sicherheitsvorkehrungen zu umgehen, und potenziell um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Named provisions

Betroffene Systeme Angriff

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 24th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0860

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Web Server Management Network Security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Web Security Network Infrastructure

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.