The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-7347

CVE-2024-7347: F5 Nginx Open Source DOS Vulnerability

CVE-2024-7347 is a denial of service vulnerability in F5 Nginx Open Source affecting the ngx_http_mp4_module that allows attackers to crash worker memory using crafted mp4 files. This post covers technical details, affected versions, impact, and mitigation strategies.

Published: January 28, 2026

CVE-2024-7347 Overview

CVE-2024-7347 is an out-of-bounds read vulnerability affecting NGINX Open Source and NGINX Plus in the ngx_http_mp4_module. This vulnerability allows an attacker to over-read NGINX worker memory, resulting in worker process termination through a denial of service condition. The attack requires a specially crafted MP4 file to trigger the vulnerability.

Critical Impact

Successful exploitation can cause NGINX worker processes to terminate, leading to service disruption for web applications and services relying on NGINX for content delivery.

Affected Products

  • F5 NGINX Open Source versions 1.5.13 through 1.26.2 and 1.27.0
  • F5 NGINX Plus R27 through R32
  • F5 NGINX Plus R31 P1

Discovery Timeline

  • 2024-08-14 - CVE-2024-7347 published to NVD
  • 2025-11-03 - Last updated in NVD database

Technical Details for CVE-2024-7347

Vulnerability Analysis

This vulnerability is classified as an out-of-bounds read (CWE-125, CWE-126) in the ngx_http_mp4_module component of NGINX. The vulnerability occurs when NGINX processes specially crafted MP4 files, causing the worker process to read beyond allocated memory boundaries.

The issue only manifests under specific conditions: NGINX must be compiled with the ngx_http_mp4_module enabled, and the mp4 directive must be configured in the NGINX configuration file. This module is commonly used for pseudo-streaming of MP4 video files, allowing clients to seek to specific positions within the video without downloading the entire file.

When an attacker can trigger the processing of a malicious MP4 file, the ngx_http_mp4_module fails to properly validate boundaries when parsing MP4 metadata structures, leading to memory over-read conditions that crash the worker process.

Root Cause

The root cause stems from insufficient boundary checking in the ngx_http_mp4_module when parsing MP4 file structures. The module does not adequately validate the size and offset values in MP4 atom/box structures before reading memory, allowing crafted files with malformed metadata to trigger out-of-bounds read operations in the NGINX worker memory space.

Attack Vector

The attack vector is local in nature, requiring the attacker to trigger processing of a specially crafted MP4 file through the vulnerable module. This typically requires:

  1. The attacker must have a way to upload or cause NGINX to process a malicious MP4 file
  2. The target NGINX server must have ngx_http_mp4_module enabled and the mp4 directive configured
  3. The malicious file must be served through a location block with MP4 streaming enabled

The vulnerability manifests during MP4 metadata parsing within the ngx_http_mp4_module. When the module processes the crafted file, it attempts to read memory beyond allocated buffer boundaries, causing the NGINX worker process to crash. For detailed technical information, refer to the F5 Knowledge Base Article.

Detection Methods for CVE-2024-7347

Indicators of Compromise

  • Unexpected NGINX worker process crashes in error logs with references to ngx_http_mp4_module
  • Presence of suspicious or unusually structured MP4 files in web-accessible directories
  • Repeated segmentation faults or memory access violations in NGINX worker processes
  • Multiple worker process restarts within short time periods

Detection Strategies

  • Monitor NGINX error logs for worker process termination events and segmentation faults
  • Implement file integrity monitoring for MP4 files served through NGINX
  • Use intrusion detection systems to identify anomalous MP4 file uploads
  • Deploy application-layer firewalls to inspect uploaded media files for malformed structures

Monitoring Recommendations

  • Enable detailed NGINX error logging and centralize log collection for analysis
  • Set up alerting for abnormal worker process restart patterns
  • Monitor system logs for NGINX-related memory access violations
  • Implement real-time monitoring of NGINX process stability metrics

How to Mitigate CVE-2024-7347

Immediate Actions Required

  • Upgrade NGINX Open Source to version 1.26.2 or 1.27.1 or later
  • Upgrade NGINX Plus to R32 P1 or later
  • If immediate patching is not possible, disable the ngx_http_mp4_module or remove mp4 directives from configuration
  • Restrict upload capabilities for MP4 files to trusted users only

Patch Information

F5 has released security patches addressing this vulnerability. Affected users should consult the F5 Knowledge Base Article for specific upgrade instructions and patch availability. Additional information is available through the Openwall OSS Security Message.

For Debian-based systems, refer to the Debian LTS Announcement for distribution-specific updates.

Workarounds

  • Disable the ngx_http_mp4_module by removing or commenting out mp4 directives in NGINX configuration
  • Implement access controls to restrict who can upload MP4 files to the server
  • Use a reverse proxy or CDN in front of NGINX to filter potentially malicious requests
  • Limit MP4 streaming functionality to internal or trusted networks only
bash
# Configuration example - Disable mp4 module in affected locations
# Comment out or remove mp4 directive from location blocks
# Before (vulnerable):
# location /videos/ {
#     mp4;
#     mp4_buffer_size 1m;
# }

# After (mitigated):
location /videos/ {
    # mp4 directive removed to mitigate CVE-2024-7347
    alias /var/www/videos/;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechNginx

  • SeverityMEDIUM

  • CVSS Score5.7

  • EPSS Probability0.20%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-126

  • CWE-125
  • Technical References
  • Openwall OSS Security Message

  • Debian LTS Announcement
  • Vendor Resources
  • F5 Knowledge Base Article
  • Related CVEs
  • CVE-2026-33029: Nginx UI Denial of Service Vulnerability

  • CVE-2026-27651: NGINX Mail Auth Module DoS Vulnerability

  • CVE-2026-27784: NGINX Open Source DoS Vulnerability

  • CVE-2024-24990: F5 Nginx Open Source DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English