F5 Nginx Instance Manager vulnerabilities
7 known vulnerabilities affecting f5/nginx_instance_manager.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2026-1642HIGHCVSS 8.2≥ 2.15.1, ≤ 2.21.02026-02-04
CVE-2026-1642 [HIGH] CWE-349 CVE-2026-1642: A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport La
A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server. Note:
nvd
CVE-2024-10318MEDIUMCVSS 5.1≥ 2.5.0, < 2.17.42024-11-06
CVE-2024-10318 [MEDIUM] CWE-384 CVE-2024-10318: A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where
A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacke
cvelistv5nvd
CVE-2024-7634MEDIUMCVSS 6.9≥ 2.3.1, < 2.17.22024-08-22
CVE-2024-7634 [MEDIUM] CWE-22 CVE-2024-7634: NGINX Agent's "config_dirs" restriction feature allows a highly privileged attacker to gain the abil
NGINX Agent's "config_dirs" restriction feature allows a highly privileged attacker to gain the ability to write/overwrite files outside of the designated secure directory.
nvd
CVE-2023-28724HIGHCVSS 7.1≥ 2.0.0, < 2.9.0≥ 1.0.0, < *2023-05-03
CVE-2023-28724 [HIGH] CWE-276 CVE-2023-28724: NGINX Management Suite default file permissions are set such that an authenticated attacker may be a
NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
cvelistv5nvd
CVE-2023-28656HIGHCVSS 8.1≥ 2.0.0, < 2.9.02023-05-03
CVE-2023-28656 [HIGH] CWE-639 CVE-2023-28656: NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects o
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
cvelistv5nvd
CVE-2023-1550MEDIUMCVSS 5.5≥ 2.0.0, < 2.9.02023-03-29
CVE-2023-1550 [MEDIUM] CWE-532 CVE-2023-1550: Insertion of Sensitive Information into log file vulnerability in NGINX Agent. NGINX Agent version 2
Insertion of Sensitive Information into log file vulnerability in NGINX Agent. NGINX Agent version 2.0 before 2.23.3 inserts sensitive information into a log file. An authenticated attacker with local access to read agent log files may gain access to private keys. This issue is only exposed when the non-default trace level logging is enabled. Note: NG
nvd
CVE-2022-35241MEDIUMCVSS 6.5≥ 1.0.0, ≤ 1.0.4≥ 2.0.0, < 2.3.1+2 more2022-08-04
CVE-2022-35241 [MEDIUM] CWE-400 CVE-2022-35241: In versions 2.x before 2.3.1 and all versions of 1.x, when NGINX Instance Manager is in use, undiscl
In versions 2.x before 2.3.1 and all versions of 1.x, when NGINX Instance Manager is in use, undisclosed requests can cause an increase in disk resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
cvelistv5nvd