Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6131-1 | nginx security update |
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5 nginx Gateway Fabric
F5 nginx Ingress Controller F5 nginx Instance Manager |
|
| Weaknesses | CWE-345 | |
| CPEs | cpe:2.3:a:f5:nginx_gateway_fabric:*:*:*:*:*:*:*:* cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:* cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:* cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r32:-:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r32:p3:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r33:p1:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r33:p2:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r33:p3:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r34:p1:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r34:p2:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r35:-:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r36:-:*:*:*:*:*:* cpe:2.3:a:f5:nginx_plus:r36:p1:*:*:*:*:*:* |
|
| Vendors & Products |
F5 nginx Gateway Fabric
F5 nginx Ingress Controller F5 nginx Instance Manager |
Thu, 05 Feb 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 04 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
F5
F5 nginx Open Source F5 nginx Plus |
|
| Vendors & Products |
F5
F5 nginx Open Source F5 nginx Plus |
Wed, 04 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | |
| Title | NGINX vulnerability | |
| Weaknesses | CWE-349 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2026-02-05T05:25:39.303Z
Reserved: 2026-01-29T18:26:26.996Z
Link: CVE-2026-1642
Updated: 2026-02-05T05:25:39.303Z
Status : Analyzed
Published: 2026-02-04T15:16:14.190
Modified: 2026-02-13T21:35:01.730
Link: CVE-2026-1642
OpenCVE Enrichment
Updated: 2026-04-18T20:15:09Z
Debian DSA