Are you aware of this 18‑year‑old NGINX flaw (CVE‑2026‑42945)?
The recent disclosure of a vulnerability in NGINX, CVE‑2026‑42945 - “NGINX Rift” is found to be an 18-year old heap buffer overflow in ngx_http_rewrite_module. Consequently, this results in crashing worker processes and enabling unauthenticated RCE by way of specially crafted “http” requests. All available versions of NGINX Open Source (1.0.0-1.30.0), NGINX Plus, and downstream parts like NGINX ingress controller and NGINX Gateway Fabric, along with a few NGINX-backed WAFs are fragile.
CIVN-2026-0239 flagged by CERT-In indicates arbitrary command execution, memory corruption, and service disruption. Indian firms are told to patch and perform configuration audits. The bug is actively being exploited in the natural environment which may require bypassing ASLR and specific conditions. In addition, a stable DoS can be found by crashing worker-processes.
Immediate Remediation:
- Update NGINX Open Source to version 1.30.1 or 1.31.0; or else NGINX Plus to version R32 P6 or R36 P4. Workers must be fully restarted upon upgrade.
- To avoid delays in patching, it is advisable to substitute all unnamed captures in configurations with named captures for instance, replacing $1 with $user_id.
- Use the command grep -rn 'rewrite.*\? to examine the configurations.
- Check for worker crash logs (SIGSEGV), and also check the access logs for unusual bursts of activity.
- Verify downstream projects (OpenResty, Kong, ingress-nginx, Tengine) and container images.
What do you think about whether to treat this as a normal run to the panic upgrade or there needs to be some stringent patch cycle to minimise the risk further?