Plataforma
nginx
Componente
nginx
Corrigido em
1.29.7
1.28.3
CVE-2026-27784 describes a memory corruption vulnerability in Nginx Open Source. An attacker can exploit this flaw by providing a specially crafted MP4 file, potentially causing Nginx worker processes to terminate. This vulnerability affects versions 1.1.19 through 1.29.7 of Nginx Open Source built with the ngxhttpmp4_module and using the mp4 directive. A fix is available in version 1.29.7.
Successful exploitation of CVE-2026-27784 allows an attacker to trigger a denial-of-service (DoS) condition by causing Nginx worker processes to crash. The vulnerability stems from an issue in the 32-bit implementation of the ngxhttpmp4_module module. The crafted MP4 file exploits a flaw in how Nginx handles the file, leading to memory over-read or over-write. This is particularly concerning for environments heavily reliant on Nginx for serving media content, as a malicious MP4 file could disrupt service availability. The attack requires the attacker to be able to trigger the processing of the crafted MP4 file by Nginx.
CVE-2026-27784 was publicly disclosed on 2026-03-24. There is no indication of active exploitation campaigns at this time. The vulnerability is limited to 32-bit Nginx installations with the ngxhttpmp4_module enabled and the mp4 directive configured, which reduces the potential attack surface. It is not currently listed on CISA KEV. Public proof-of-concept exploits are not yet available.
Organizations running 32-bit Nginx Open Source installations with the ngxhttpmp4_module enabled and the mp4 directive configured are at risk. This includes media streaming services, video hosting platforms, and any application relying on Nginx to serve MP4 content. Legacy systems or those with limited resources may be slower to upgrade, increasing their exposure window.
• linux / server:
journalctl -u nginx -g "ngx_http_mp4_module" | grep -i error• generic web:
curl -I http://your-nginx-server/stream.mp4 | grep -i "Content-Type: multipart/x-mixed-replace"• nginx: Check nginx configuration files for the presence of the mp4 directive and the inclusion of the ngxhttpmp4_module module. Review Nginx error logs for any unusual crashes or memory-related errors.
disclosure
Status do Exploit
EPSS
0.01% (percentil 2%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2026-27784 is to upgrade Nginx Open Source to version 1.29.7 or later. If upgrading is not immediately feasible, consider disabling the ngxhttpmp4_module module by removing it from the Nginx configuration file. This will prevent the processing of MP4 files by the vulnerable module. Additionally, implement strict input validation for MP4 files served by Nginx to prevent the upload or processing of potentially malicious files. Monitor Nginx error logs for unusual crashes or memory-related errors that could indicate exploitation attempts. After upgrading, confirm the fix by attempting to serve a known-good MP4 file and verifying that Nginx processes it without errors.
Actualice NGINX Open Source a la versión 1.29.7 o superior, o a la versión 1.28.3 o superior, dependiendo de su rama de versión. Esto solucionará la vulnerabilidad en el módulo ngx_http_mp4_module. Si no puede actualizar, evite usar la directiva mp4 en su archivo de configuración.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2026-27784 is a HIGH severity vulnerability affecting Nginx Open Source versions 1.1.19–1.29.7 where a crafted MP4 file can cause memory corruption and potential Nginx worker termination.
You are affected if you are running Nginx Open Source versions 1.1.19 through 1.29.7, are using a 32-bit architecture, have the ngxhttpmp4_module enabled, and are using the mp4 directive in your configuration.
Upgrade to Nginx Open Source version 1.29.7 or later. Alternatively, disable the ngxhttpmp4_module module in your configuration.
There is currently no indication of active exploitation campaigns for CVE-2026-27784.
Refer to the official Nginx security advisory for CVE-2026-27784 at [https://nginx.org/security/advisories/](https://nginx.org/security/advisories/)
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.