Back to Articles
F5 Patches 18-Year-Old AI-Found 'Rift' Vulnerability in NGINX Web Server

iTnews

ENRICHED

Details

Date Published
12 Feb 2025
Priority Score
3
Australian
Yes
Created
15 May 2026, 12:00 pm

Authors (1)

Description

Heap buffer overflow in rewrite module.

Summary

This incident highlights a significant advancement in frontier AI capabilities where AI-driven scanners successfully identified a critical memory corruption vulnerability (CVE-2026-42945) that remained undetected in NGINX source code for 18 years. While the 'Rift' vulnerability could allow remote code execution, its discovery by AI underscores the dual-use risk of such technologies in accelerating the identification of exploitable flaws in global digital infrastructure. The ability of AI to automate the discovery of high-severity vulnerabilities across legacy codebases poses notable implications for global cybersecurity and the proactive management of catastrophic systemic risks to internet stability.

Body

F5, the company supporting the world's most popular web server NGINX, has issued patches for a critical memory corruption bug causing a heap buffer overflow, that could potentially be abused for remote code execution in vulnerable systems. Researchers at code vulnerability analysis firm Depthfirst analysed the source code for NGINX using their artificial intelligence (AI) scanner and found the critical vulnerability rated as 9.2 out of 10 on the Common Vulnerability Scoring System (CVSS) 4.0 in the NGINX rewrite module. It requires rewrite and set directives to trigger, a specific configuration commonly used in PHP front controllers, WordPress permalinks and application programming interface (API) gateways bridging public links to internal endpoints. The security vendor has published a proof-of-concept on GitHub for the vulnerability, which it has named NGINX Rift and is indexed as CVE-2026-42945. Enterprise Linux distribution vendor AlmaLinux noted that turning the PoC into a ready to use remote code execution (RCE) exploit is not trivial, as Depthfirst turned off memory address space layout randomisation (ASLR) for its code. ASLR is a memory corruption protection measure that is enabled by default in every modern operating system; turning it off makes the heap layout unpredictable. While RCE is not impossible to achieve, on systems with ASLR on by default, the reliable outcome of the bug is a worker process crash which amounts to a denial of service attack. Affected versions include NGINX Open Source 0.6.27 to 1.30.0, with the fixed versions being 1.30.1 and 1.31.0. NGINX Plus R32 to R36 are also vulnerable; fixed versions include R32 P6, R35 P2 and R36 P4. Depthfirst also found other memory corruption bugs, including one rated as high (8.3/10) and two other medium severity ones. NGINX has around a third market share of the world's web servers, with many of the internet's most popular sites using it.