Description
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module.


Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Published: 2026-03-24
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service through memory corruption
Action: Immediate Patch
AI Analysis

Impact

A flaw in the 32‑bit build of NGINX Open Source within the ngx_http_mp4_module allows an attacker to supply a specially crafted MP4 file that causes the module to read or write outside its intended bounds. The resulting overflow corrupts worker memory, leading the NGINX worker process to terminate. The weakness is a classic integer or arithmetic error, identified as CWE‑190, and it does not directly expose data or enable code execution. The outcome is a loss of service when the worker crashes.

Affected Systems

The vulnerability applies to 32‑bit F5 NGINX Open Source installations that were built with the ngx_http_mp4_module and have the mp4 directive enabled in their configuration. No specific version ranges are listed, so any configured 32‑bit build that serves MP4 files is in scope.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity. The EPSS score of less than 1% suggests a low likelihood of exploitation, and the vulnerability is not present in the CISA KEV catalog. Attackers must be able to deliver a malicious MP4 file to a server that processes it with the ngx_http_mp4_module; if the conditions are met, the server will crash, causing a denial of service to legitimate users.

Generated by OpenCVE AI on March 30, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest NGINX Open Source release that removes the vulnerability
  • If an upgrade is not immediately possible, disable the ngx_http_mp4_module or remove the mp4 directive from the configuration to prevent processing of MP4 files
  • Monitor server logs for abnormal MP4 requests and verify that no malicious files are being served

Generated by OpenCVE AI on March 30, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared F5
F5 nginx Open Source
Vendors & Products F5
F5 nginx Open Source

Wed, 25 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Title NGINX ngx_http_mp4_module vulnerability
Weaknesses CWE-190
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

F5 Nginx Open Source
cve-icon MITRE

Status: PUBLISHED

Assigner: f5

Published:

Updated: 2026-03-25T14:09:53.726Z

Reserved: 2026-03-18T16:06:38.416Z

Link: CVE-2026-27784

cve-icon Vulnrichment

Updated: 2026-03-24T15:22:49.292Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T15:16:33.350

Modified: 2026-03-30T13:59:42.597

Link: CVE-2026-27784

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-24T14:13:25Z

Links: CVE-2026-27784 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:58:09Z

Weaknesses