A newly reported zero-day vulnerability on NGINX Plus and NGINX Open, identified as CVE-2026-42945, is being actively exploited in the real environment just days after its publication, according to research reports. This is a Buffer overflow in lots (heap buffer overflow) in the ngx _ http _ rewrite _ module module, attributable to code that, according to forensic analysis, was introduced years ago and affects a wide range of historical versions of NGINX. The risk is considered high (CVSS ~ 9.x) because an unauthenticated attacker can cause the fall of worker processes and, even in specific situations, reach remote code execution.
It is important to distinguish two technical scenarios that define practical gravity: on the one hand there is a denial of service (DoS) of the workers; on the other hand, the remote code execution (CERs) It is theoretically possible but requires additional conditions - in particular, that ASLR (Address Space Layout Randomization) be disabled - and that the attacker know or discover a specific NGINX configuration that makes the rewrite module exploitable. In modern and well-configured environments, ASLR is usually active by default, which complicates turning the overflow into a stable explosion, although it does not make it impossible.

The practical consequences vary according to deployment: for public web servers the ability to cause continuous restart of workers can degrade services and open windows for subsequent attacks; for infrastructure managed with automation tools or containers, the combination of this failure with external configuration weaknesses (e.g., insufficient access controls) can facilitate side movements and persistence. In addition, researchers have observed that actors have started to scan and exploit vulnerable facilities, making the finding a operational priority for administrators.
In parallel, the same investigation team detected exploitation against openDCIM, an open source application for data centre infrastructure management, where several critical failures that can be chained up to obtain CERs in a few steps were identified. If your organization uses openDCIM, review the code and deploy immediately; the project is available in GitHub at https: / / github.com / samilliken / openDCIM and it is appropriate to compare the version in use with patches published by temporary maintenance or mitigation.
To prioritize the technical response, start with apply official patches as soon as they are available for your NGINX variant. F5, which has maintained NGINX since its acquisition, publishes notices and patches; it is also advisable to review the database of public vulnerabilities in the NVD for cross-references and details of the CVE in https: / / nvd.nist.gov /. If you cannot park immediately, implement mitigations such as restricting access to affected instances from the Internet, applying WAF rules to block suspicious demand patterns to the rewriting module and isolating critical systems.
Verify and strengthen system memory protection: check the ASLR status with the kernel command (e.g., sysctl kernel) and, if for any reason it is disabled in production systems, have sysctl -w kernel. Randomize _ va _ space = 2. While activating ASLR does not replace the patch, it significantly reduces the probability of successful operation that turns overflow into code execution.

Audit NGINX configurations by looking for complex rules in ngx _ http _ rewrite _ module and unusual patterns that may be the target of manipulated requests; the explosion requires knowing or discovering vulnerable settings, so a review and simplification of rewriting rules can mitigate the risk. Also monitor access and error log to detect unusual requests directed at rewriting endpoints and web shells or remote command loading attempts signals.
In the case of openDCIM and similar web applications, apply the principle of less privilege: limit administrative access to management networks, disable environment variables such as REMOTE _ USER without authentication controls in Docker environments, and fully validate or heal parameters that can be passed to systems or commands, such as the "dot" parameter identified in the investigations. The file integrity audit and outgoing output control (e.g., reverse connections) help to detect web shells early.
Finally, keep in mind that attackers are automating the detection of these vulnerabilities with tools that incorporate artificial intelligence capabilities, so attempts at exploitation can scale quickly. Maintain a response plan that includes patches, temporary network blocks, forensic analysis if you detect engagement and communication to incident response teams. For additional technical documentation on ASLR and memory operation mitigation see general sources such as Wikipedia's entry on Address Space Layout Randomization in https: / / en.wikipedia.org / wiki / Address _ space _ layout _ randomization and the NGINX safety guide in https: / / nginx.org /.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...