The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-42934

CVE-2026-42934: NGINX Information Disclosure Vulnerability

CVE-2026-42934 is an information disclosure vulnerability in NGINX Plus and NGINX Open Source affecting the ngx_http_charset_module. This article covers technical details, affected configurations, potential impact, and mitigation.

Published: May 17, 2026

CVE-2026-42934 Overview

CVE-2026-42934 is a heap buffer over-read vulnerability in the ngx_http_charset_module module of NGINX Plus and NGINX Open Source. The flaw is triggered when charset, source_charset, charset_map, and proxy_pass with buffering disabled (proxy_buffering off) are configured together. Unauthenticated remote attackers can send crafted requests that, under conditions outside the attacker's direct control, cause the NGINX worker process to read beyond an allocated heap buffer. Successful exploitation can result in limited memory disclosure or a worker process restart. The vulnerability is classified as an Out-of-Bounds Read [CWE-125].

Critical Impact

Unauthenticated network attackers can cause limited memory disclosure or worker process restarts in NGINX deployments using the affected module configuration.

Affected Products

  • NGINX Plus
  • NGINX Open Source
  • Configurations using ngx_http_charset_module with proxy_pass and disabled proxy buffering

Discovery Timeline

  • 2026-05-13 - CVE-2026-42934 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-42934

Vulnerability Analysis

The vulnerability resides in the ngx_http_charset_module, which transforms response bodies between character sets defined via the charset, source_charset, and charset_map directives. When NGINX proxies a response using proxy_pass with proxy_buffering off, the module processes upstream data in smaller, unbuffered chunks. Under specific input conditions, the charset filter reads past the end of an allocated heap buffer. The over-read returns adjacent heap memory contents to the response stream or triggers a fault that restarts the worker. Because the trigger depends on upstream data alignment and chunk boundaries, the attacker cannot fully control the disclosed bytes. The issue is reachable over the network without authentication or user interaction.

Root Cause

The root cause is improper boundary checking in the charset translation logic when operating on unbuffered proxied response data. The module assumes input buffers contain complete, well-formed byte sequences for the configured source charset. Partial multibyte sequences split across chunk boundaries can cause the conversion routine to read bytes beyond the buffer end. This is a classic Out-of-Bounds Read [CWE-125] caused by missing length validation before dereferencing buffer pointers.

Attack Vector

An unauthenticated attacker sends HTTP requests to an NGINX server configured with the vulnerable directive combination. The request must traverse a proxy_pass location where proxy_buffering is set to off and the charset filter is active. The upstream response, combined with the request path, must produce input that splits multibyte sequences at chunk boundaries. The attacker cannot directly control the upstream response, which limits exploit reliability. Successful triggering leaks small fragments of worker process heap memory to the client or causes a worker restart, producing a partial denial of service.

No public proof-of-concept exploit code is available. Refer to the F5 Security Advisory K000161028 for vendor technical details.

Detection Methods for CVE-2026-42934

Indicators of Compromise

  • Unexpected NGINX worker process restarts logged in error.log with signal 11 (SIGSEGV) entries
  • HTTP responses containing unexpected binary or non-printable bytes following text content
  • Elevated rates of connection resets from NGINX during charset-transformed proxy responses
  • Abnormal request patterns targeting endpoints that use proxy_pass with charset conversion

Detection Strategies

  • Audit all NGINX configurations for simultaneous use of charset, source_charset, charset_map, and proxy_pass with proxy_buffering off
  • Monitor nginx -T output to identify locations exposing the vulnerable directive combination
  • Inspect worker process crash counts and worker_process respawn events over time
  • Deploy network detections for response anomalies on charset-converted proxy endpoints

Monitoring Recommendations

  • Forward NGINX error.log and access.log to a centralized log platform for correlation
  • Alert on repeated worker process termination signals within short time windows
  • Track HTTP 502 and connection-reset rates per proxied upstream
  • Baseline response sizes on charset-enabled endpoints and alert on outliers

How to Mitigate CVE-2026-42934

Immediate Actions Required

  • Apply the patched NGINX Plus or NGINX Open Source release identified in the F5 Security Advisory K000161028
  • Inventory all NGINX instances and identify those running supported, non-EoTS versions
  • Review configurations for the vulnerable directive combination and prioritize patching internet-facing servers
  • Restart NGINX workers after patching to ensure new binaries are in use

Patch Information

F5 has published remediation guidance in F5 Security Advisory K000161028. Software versions that have reached End of Technical Support (EoTS) are not evaluated and should be upgraded to a supported release. Verify the installed NGINX version using nginx -v and confirm it matches or exceeds the fixed version listed in the advisory.

Workarounds

  • Enable response buffering by setting proxy_buffering on in affected location or server blocks
  • Remove the charset, source_charset, or charset_map directives from configurations that proxy with buffering disabled
  • Restrict access to affected endpoints using allow/deny rules until patching completes
  • Place a Web Application Firewall in front of NGINX to filter malformed requests targeting charset-enabled paths
bash
# Configuration example: enable proxy buffering to mitigate exposure
location /api/ {
    proxy_pass http://upstream_backend;
    proxy_buffering on;          # mitigates CVE-2026-42934
    # charset utf-8;             # safe when buffering is enabled
    # source_charset iso-8859-1;
}

# Verify installed NGINX version
nginx -v

# Validate configuration after changes
nginx -t && nginx -s reload

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechNginx

  • SeverityMEDIUM

  • CVSS Score6.3

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-125
  • Technical References
  • F5 Security Advisory K000161028
  • Related CVEs
  • CVE-2026-42946: NGINX Information Disclosure Vulnerability

  • CVE-2026-42220: Nginx UI Information Disclosure Flaw

  • CVE-2026-42223: Nginx UI Information Disclosure Flaw

  • CVE-2026-27944: Nginx UI Information Disclosure Issue
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English