CVE-2026-1642

Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
04/02/2026
Last modified:
13/02/2026

Description

A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:f5:nginx_gateway_fabric:*:*:*:*:*:*:*:* 1.2.0 (including) 1.6.2 (including)
cpe:2.3:a:f5:nginx_gateway_fabric:*:*:*:*:*:*:*:* 2.0.0 (including) 2.4.1 (excluding)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:* 3.4.0 (including) 3.7.2 (including)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:* 4.0.0 (including) 4.0.1 (including)
cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:* 5.0.0 (including) 5.3.3 (excluding)
cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:* 2.15.1 (including) 2.21.0 (including)
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:* 1.3.0 (including) 1.28.2 (excluding)
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:* 1.29.0 (including) 1.29.5 (excluding)
cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:* r33 (including) r35 (excluding)
cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r32:p3:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p1:*:*:*:*:*:*
cpe:2.3:a:f5:nginx_plus:r33:p2:*:*:*:*:*:*