{
  "document" : {
    "aggregate_severity" : {
      "text" : "hoch"
    },
    "category" : "csaf_base",
    "csaf_version" : "2.0",
    "distribution" : {
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "de-DE",
    "notes" : [ {
      "category" : "legal_disclaimer",
      "text" : "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen."
    }, {
      "category" : "description",
      "text" : "NGINX Plus ist die kommerzielle Variante von NGINX, einer Webserver-, Reverse Proxy- und E-Mail Proxy Software.\r\nNGINX ist eine Webserver-, Reverse Proxy- und E-Mail-Proxy Software.",
      "title" : "Produktbeschreibung"
    }, {
      "category" : "summary",
      "text" : "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in NGINX Open Source and NGINX Plus ausnutzen, um Sicherheitsvorkehrungen zu umgehen, beliebigen Code auszuführen, Daten zu manipulieren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.",
      "title" : "Angriff"
    }, {
      "category" : "general",
      "text" : "- Linux\n- UNIX\n- Windows",
      "title" : "Betroffene Betriebssysteme"
    } ],
    "publisher" : {
      "category" : "other",
      "contact_details" : "csaf-provider@cert-bund.de",
      "name" : "Bundesamt für Sicherheit in der Informationstechnik",
      "namespace" : "https://www.bsi.bund.de"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "WID-SEC-W-2026-1527 - CSAF Version",
      "url" : "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1527.json"
    }, {
      "category" : "self",
      "summary" : "WID-SEC-2026-1527 - Portal Version",
      "url" : "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1527"
    }, {
      "category" : "external",
      "summary" : "GitHub Security Advisory GHSA-GCGV-V5GF-C543 vom 2026-05-13",
      "url" : "https://github.com/advisories/GHSA-GCGV-V5GF-C543"
    }, {
      "category" : "external",
      "summary" : "GitHub Security Advisory GHSA-H7RQ-F9GQ-MC8R vom 2026-05-13",
      "url" : "https://github.com/advisories/GHSA-H7RQ-F9GQ-MC8R"
    }, {
      "category" : "external",
      "summary" : "GitHub Security Advisory GHSA-X88Q-X2R7-VG3G vom 2026-05-13",
      "url" : "https://github.com/advisories/GHSA-X88Q-X2R7-VG3G"
    }, {
      "category" : "external",
      "summary" : "GitHub Security Advisory GHSA-V43F-895R-CHHH vom 2026-05-13",
      "url" : "https://github.com/advisories/GHSA-V43F-895R-CHHH"
    }, {
      "category" : "external",
      "summary" : "GitHub Security Advisory GHSA-6VMC-2WH4-77QP vom 2026-05-13",
      "url" : "https://github.com/advisories/GHSA-6VMC-2WH4-77QP"
    }, {
      "category" : "external",
      "summary" : "GitHub Security Advisory GHSA-FM65-XRRR-C358 vom 2026-05-13",
      "url" : "https://github.com/advisories/GHSA-FM65-XRRR-C358"
    }, {
      "category" : "external",
      "summary" : "PoC CVE-2026-42945 vom 2026-05-13",
      "url" : "https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC"
    }, {
      "category" : "external",
      "summary" : "F5 Security Advisory K000161019 vom 2026-05-13",
      "url" : "https://my.f5.com/manage/s/article/K000161019"
    }, {
      "category" : "external",
      "summary" : "F5 Security Advisory K000161021 vom 2026-05-13",
      "url" : "https://my.f5.com/manage/s/article/K000161021"
    }, {
      "category" : "external",
      "summary" : "F5 Security Advisory K000161068 vom 2026-05-13",
      "url" : "https://my.f5.com/manage/s/article/K000161068"
    }, {
      "category" : "external",
      "summary" : "F5 Security Advisory K000161131 vom 2026-05-13",
      "url" : "https://my.f5.com/manage/s/article/K000161131"
    }, {
      "category" : "external",
      "summary" : "F5 Security Advisory K000161027 vom 2026-05-13",
      "url" : "https://my.f5.com/manage/s/article/K000161027"
    }, {
      "category" : "external",
      "summary" : "F5 Security Advisory K000161028 vom 2026-05-13",
      "url" : "https://my.f5.com/manage/s/article/K000161028"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2026-094EB13BB1 vom 2026-05-14",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2026-094eb13bb1"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-8271-1 vom 2026-05-14",
      "url" : "https://ubuntu.com/security/notices/USN-8271-1"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2026-FB53CB4D67 vom 2026-05-14",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2026-fb53cb4d67"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2026-38623B4FED vom 2026-05-14",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2026-38623b4fed"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17751 vom 2026-05-15",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17751"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17753 vom 2026-05-15",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17753"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17752 vom 2026-05-15",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17752"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:18029 vom 2026-05-18",
      "url" : "https://access.redhat.com/errata/RHSA-2026:18029"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17790 vom 2026-05-15",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17790"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17791 vom 2026-05-15",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17791"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17792 vom 2026-05-16",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17792"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17793 vom 2026-05-15",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17793"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:17794 vom 2026-05-16",
      "url" : "https://access.redhat.com/errata/RHSA-2026:17794"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:18063 vom 2026-05-18",
      "url" : "https://access.redhat.com/errata/RHSA-2026:18063"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:18041 vom 2026-05-18",
      "url" : "https://access.redhat.com/errata/RHSA-2026:18041"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DLA-4589 vom 2026-05-18",
      "url" : "https://lists.debian.org/debian-lts-announce/2026/05/msg00033.html"
    }, {
      "category" : "external",
      "summary" : "openSUSE Security Update OPENSUSE-SU-2026:10796-1 vom 2026-05-18",
      "url" : "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EVUBHQ3CZLOXLHHOL5Y3BXTI4PSUI2YD/"
    }, {
      "category" : "external",
      "summary" : "Rocky Linux Security Advisory RLSA-2026:18041 vom 2026-05-18",
      "url" : "https://errata.build.resf.org/RLSA-2026:18041"
    } ],
    "source_lang" : "en-US",
    "title" : "NGINX Open Source and NGINX Plus: Mehrere Schwachstellen",
    "tracking" : {
      "current_release_date" : "2026-05-18T22:00:00.000+00:00",
      "generator" : {
        "date" : "2026-05-19T05:36:18.303+00:00",
        "engine" : {
          "name" : "BSI-WID",
          "version" : "1.5.0"
        }
      },
      "id" : "WID-SEC-W-2026-1527",
      "initial_release_date" : "2026-05-14T22:00:00.000+00:00",
      "revision_history" : [ {
        "date" : "2026-05-14T22:00:00.000+00:00",
        "number" : "1",
        "summary" : "Initiale Fassung"
      }, {
        "date" : "2026-05-14T22:00:00.000+00:00",
        "number" : "2",
        "summary" : "version nicht vorhanden"
      }, {
        "date" : "2026-05-17T22:00:00.000+00:00",
        "number" : "3",
        "summary" : "Exploit CVE-2026-42945 bestätigt"
      }, {
        "date" : "2026-05-18T22:00:00.000+00:00",
        "number" : "4",
        "summary" : "Neue Updates von Red Hat, Debian, openSUSE und Rocky Enterprise Software Foundation aufgenommen"
      } ],
      "status" : "final",
      "version" : "4"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Debian Linux",
        "product" : {
          "name" : "Debian Linux",
          "product_id" : "2951",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:debian:debian_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Debian"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Fedora Linux",
        "product" : {
          "name" : "Fedora Linux",
          "product_id" : "74185",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:fedoraproject:fedora:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Fedora"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "Open Source <1.31.0",
          "product" : {
            "name" : "NGINX NGINX Open Source <1.31.0",
            "product_id" : "T054115"
          }
        }, {
          "category" : "product_version",
          "name" : "Open Source 1.31.0",
          "product" : {
            "name" : "NGINX NGINX Open Source 1.31.0",
            "product_id" : "T054115-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:nginx:nginx:open_source__1.31.0"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "Open Source <1.30.1",
          "product" : {
            "name" : "NGINX NGINX Open Source <1.30.1",
            "product_id" : "T054116"
          }
        }, {
          "category" : "product_version",
          "name" : "Open Source 1.30.1",
          "product" : {
            "name" : "NGINX NGINX Open Source 1.30.1",
            "product_id" : "T054116-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:nginx:nginx:open_source__1.30.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "NGINX"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<37.0.0",
          "product" : {
            "name" : "NGINX NGINX Plus <37.0.0",
            "product_id" : "T054112"
          }
        }, {
          "category" : "product_version",
          "name" : "37.0.0",
          "product" : {
            "name" : "NGINX NGINX Plus 37.0.0",
            "product_id" : "T054112-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:nginx:nginx_plus:37.0.0"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<R36 P4",
          "product" : {
            "name" : "NGINX NGINX Plus <R36 P4",
            "product_id" : "T054113"
          }
        }, {
          "category" : "product_version",
          "name" : "R36 P4",
          "product" : {
            "name" : "NGINX NGINX Plus R36 P4",
            "product_id" : "T054113-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:nginx:nginx_plus:r36_p4"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<R32 P6",
          "product" : {
            "name" : "NGINX NGINX Plus <R32 P6",
            "product_id" : "T054118"
          }
        }, {
          "category" : "product_version",
          "name" : "R32 P6",
          "product" : {
            "name" : "NGINX NGINX Plus R32 P6",
            "product_id" : "T054118-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:nginx:nginx_plus:r32_p6"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "NGINX Plus"
      } ],
      "category" : "vendor",
      "name" : "NGINX"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "RESF Rocky Linux",
        "product" : {
          "name" : "RESF Rocky Linux",
          "product_id" : "T032255",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:resf:rocky_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "RESF"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Red Hat Enterprise Linux",
        "product" : {
          "name" : "Red Hat Enterprise Linux",
          "product_id" : "67646",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:redhat:enterprise_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Red Hat"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "SUSE openSUSE",
        "product" : {
          "name" : "SUSE openSUSE",
          "product_id" : "T027843",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:suse:opensuse:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "SUSE"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Ubuntu Linux",
        "product" : {
          "name" : "Ubuntu Linux",
          "product_id" : "T000126",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:canonical:ubuntu_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Ubuntu"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2026-40460",
    "product_status" : {
      "known_affected" : [ "T054112", "2951", "67646", "T000126", "T027843", "T054118", "T054116", "T032255", "T054115", "74185", "T054113" ]
    },
    "release_date" : "2026-05-13T22:00:00.000+00:00",
    "title" : "CVE-2026-40460"
  }, {
    "cve" : "CVE-2026-40701",
    "product_status" : {
      "known_affected" : [ "2951", "67646", "T000126", "T027843", "T054118", "T054116", "T032255", "T054115", "74185", "T054113" ]
    },
    "release_date" : "2026-05-13T22:00:00.000+00:00",
    "title" : "CVE-2026-40701"
  }, {
    "cve" : "CVE-2026-42926",
    "product_status" : {
      "known_affected" : [ "2951", "67646", "T000126", "T027843", "T054116", "T032255", "T054115", "74185" ]
    },
    "release_date" : "2026-05-13T22:00:00.000+00:00",
    "title" : "CVE-2026-42926"
  }, {
    "cve" : "CVE-2026-42934",
    "product_status" : {
      "known_affected" : [ "T054112", "2951", "67646", "T000126", "T027843", "T054118", "T054116", "T032255", "T054115", "74185", "T054113" ]
    },
    "release_date" : "2026-05-13T22:00:00.000+00:00",
    "title" : "CVE-2026-42934"
  }, {
    "cve" : "CVE-2026-42945",
    "product_status" : {
      "known_affected" : [ "T054112", "2951", "67646", "T000126", "T027843", "T054118", "T054116", "T032255", "T054115", "74185", "T054113" ]
    },
    "release_date" : "2026-05-13T22:00:00.000+00:00",
    "title" : "CVE-2026-42945"
  }, {
    "cve" : "CVE-2026-42946",
    "product_status" : {
      "known_affected" : [ "2951", "67646", "T000126", "T027843", "T054118", "T054116", "T032255", "T054115", "74185", "T054113" ]
    },
    "release_date" : "2026-05-13T22:00:00.000+00:00",
    "title" : "CVE-2026-42946"
  } ]
}