Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

NGINX CVE-2026-42945 can be exploited in the wild to cause worker crash and possible RCE

Grafana GitHub token compromise led to codebase downloads and extortion attempts

The haves and have-nots of the AI ​​gold rush

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » NGINX CVE-2026-42945 can be exploited in the wild to cause worker crash and possible RCE
Identity

NGINX CVE-2026-42945 can be exploited in the wild to cause worker crash and possible RCE

By May 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 17, 2026Server security/vulnerabilities

According to VulnCheck, a newly disclosed security flaw affecting NGINX Plus and NGINX Open has become exploitable in the wild just days after its publication.

The vulnerability, tracked as CVE-2026-42945 (CVSS score: 9.2), is a heap buffer overflow in ngx_http_rewrite_module that affects NGINX versions 0.6.27 through 1.30.0. According to AI-native security firm DepthFirst, the vulnerability was introduced in 2008.

Successful exploitation of this flaw could allow an unauthenticated attacker to crash the worker process or potentially execute remote code via a crafted HTTP request. However, note that code execution is only possible on devices where Address Space Layout Randomization (ASLR), a safeguard against memory-based attacks, is turned off.

“This vulnerability relies on a specific NGINX configuration, which an attacker could learn or discover and exploit,” said security researcher Kevin Beaumont. “To reach RCE [remote code execution]ASLR must also be disabled on the box. ”

In a similar review, an AlmaLinux maintainer said: “Turning a heap overflow into reliable code execution is not trivial with default settings, and we do not expect that systems with ASLR enabled (the default in all supported AlmaLinux releases) will make it easy to create a generic and reliable exploit.”

“However, ‘not easy’ does not mean ‘impossible’. Worker crash DoS is exploitable enough on its own, so we recommend treating this as an emergency,” the maintainer added.

VulnCheck’s latest findings show that attackers are starting to weaponize this flaw and are detecting attempts to exploit its honeypot networks. The nature and ultimate goal of the campaign is currently unknown. We recommend that users apply the latest fixes for F5 to protect their networks from active threats.

flaws in openDCIM can also be exploited

This development comes after VulnCheck revealed an exploit campaign targeting two critical flaws in openDCIM, an open source application used for data center infrastructure management. Both vulnerabilities are rated 9.3 on the CVSS scoring system and are listed below.

CVE-2026-28515 – Insufficient authentication vulnerability could allow authenticated users to access LDAP configuration functions regardless of assigned privileges. In Docker deployments where REMOTE_USER is set without enforcing authentication, it is possible to reach the endpoint without credentials, allowing unauthorized changes to the application configuration. CVE-2026-28517 – Operating system command injection vulnerability affecting the “report_network_map.php” component. This component processes a parameter called “dot” without sanitizing it and passes it directly to the shell command, resulting in arbitrary code execution.

These two vulnerabilities were discovered by VulnCheck security researcher Valentin Lobstein in February 2026, alongside the openDCIM SQL injection vulnerability CVE-2026-28516 (CVSS score: 9.3). According to Lobstein, the three flaws could be chained together to execute remote code in five HTTP requests and generate a reverse shell.

Caitlin Condon, vice president of security research at VulnCheck, said: “The cluster of threat actors we’ve observed so far originates from a single Chinese IP, using what appears to be a customized implementation of the AI ​​vulnerability discovery tool Vulnhuntr to automatically check for vulnerable installations before dropping a PHP web shell.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGrafana GitHub token compromise led to codebase downloads and extortion attempts

Related Posts

Grafana GitHub token compromise led to codebase downloads and extortion attempts

May 17, 2026

Actively exploited funnel builder flaw allows WooCommerce checkout skimming

May 16, 2026

Turla turns Kazuar backdoor into modular P2P botnet for persistent access

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

NGINX CVE-2026-42945 can be exploited in the wild to cause worker crash and possible RCE

Grafana GitHub token compromise led to codebase downloads and extortion attempts

The haves and have-nots of the AI ​​gold rush

Research repository ArXiv bans authors for a year if they let AI do all the work

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.