Bug 2436738 (CVE-2026-1642) - CVE-2026-1642 nginx: NGINX: Data injection via man-in-the-middle attack on TLS proxied connections
Summary: CVE-2026-1642 nginx: NGINX: Data injection via man-in-the-middle attack on TL...
Keywords:
Status: NEW
Alias: CVE-2026-1642
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2436870 2436871
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-04 16:01 UTC by OSIDB Bzimport
Modified: 2026-03-03 11:27 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:3638 0 None None None 2026-03-03 11:27:20 UTC

Description OSIDB Bzimport 2026-02-04 16:01:15 UTC
A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Comment 3 errata-xmlrpc 2026-03-03 11:27:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:3638 https://access.redhat.com/errata/RHSA-2026:3638


Note You need to log in before you can comment on or make changes to this bug.