<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NGINX CVE-2026-42945: Check Point-Managed NGINX Deployments Not Affected in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/NGINX-CVE-2026-42945-Check-Point-Managed-NGINX-Deployments-Not/m-p/277141#M406</link>
    <description>&lt;H4 class="title is-size-5" data-v-9ec38c24=""&gt;&lt;STRONG data-olk-copy-source="MessageBody"&gt;Description&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="content cve-x-scroll" data-v-9ec38c24=""&gt;NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module&amp;nbsp;module. This vulnerability exists when the rewrite&amp;nbsp;directive is followed by a rewrite, if, or set&amp;nbsp;directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.&amp;nbsp;&lt;/P&gt;
&lt;H4 class="title is-size-5" data-v-9ec38c24=""&gt;&lt;STRONG data-olk-copy-source="MessageBody"&gt;Check Point Statement Regarding NGINX Vulnerability CVE-2026-42945&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="x_MsoNormal"&gt;Check Point is aware of the recently disclosed NGINX vulnerability&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A id="anchor-0ecd3ee1-85a6-5e7d-727e-e4a27374e783" title="https://www.cve.org/CVERecord?id=CVE-2026-42945" href="https://www.cve.org/CVERecord?id=CVE-2026-42945" target="_blank" rel="noopener" data-linkindex="6" data-auth="NotApplicable"&gt;CVE-2026-42945&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;affecting the ngx_http_rewrite_module component in certain NGINX configurations. According to the official F5 advisory, the vulnerability may be triggered under specific conditions involving rewrite directives, unnamed PCRE capture groups, and replacement strings containing a question mark (?).&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;Following internal assessment and validation, Check Point confirms that Check Point-managed NGINX deployments are &lt;STRONG&gt;not affected&lt;/STRONG&gt; by this vulnerability. The impacted ngx_http_rewrite_module functionality and vulnerable rewrite configuration pattern are not utilized within the Check Point WAF architecture or request processing flow.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;All Check Point-managed NGINX deployments, including&lt;STRONG&gt; CloudGuard WAF SaaS, AppSec Gateway, and Unified Container configurations, are not vulnerable to this CVE&lt;/STRONG&gt;. Nevertheless, updated images including NGINX version 1.30.1 will be released shortly as part of our ongoing security and software maintenance process.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;Customers independently managing external or customer-owned NGINX infrastructure are strongly encouraged to upgrade their NGINX deployments to version 1.30.1 (or later) in accordance with the vendor’s security guidance and best practices.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;Check Point continuously monitors emerging vulnerabilities and security advisories as part of its ongoing product security and hardening processes.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;For any questions or additional guidance, please contact your Check Point representative. Check Point remains committed to keeping customers secure and staying ahead of emerging vulnerabilities.&lt;/P&gt;
&lt;P class="x_MsoNormal" aria-hidden="true"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 19 May 2026 17:18:03 GMT</pubDate>
    <dc:creator>Vani</dc:creator>
    <dc:date>2026-05-19T17:18:03Z</dc:date>
    <item>
      <title>NGINX CVE-2026-42945: Check Point-Managed NGINX Deployments Not Affected</title>
      <link>https://community.checkpoint.com/t5/WAF/NGINX-CVE-2026-42945-Check-Point-Managed-NGINX-Deployments-Not/m-p/277141#M406</link>
      <description>&lt;H4 class="title is-size-5" data-v-9ec38c24=""&gt;&lt;STRONG data-olk-copy-source="MessageBody"&gt;Description&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="content cve-x-scroll" data-v-9ec38c24=""&gt;NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module&amp;nbsp;module. This vulnerability exists when the rewrite&amp;nbsp;directive is followed by a rewrite, if, or set&amp;nbsp;directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.&amp;nbsp;&lt;/P&gt;
&lt;H4 class="title is-size-5" data-v-9ec38c24=""&gt;&lt;STRONG data-olk-copy-source="MessageBody"&gt;Check Point Statement Regarding NGINX Vulnerability CVE-2026-42945&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="x_MsoNormal"&gt;Check Point is aware of the recently disclosed NGINX vulnerability&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A id="anchor-0ecd3ee1-85a6-5e7d-727e-e4a27374e783" title="https://www.cve.org/CVERecord?id=CVE-2026-42945" href="https://www.cve.org/CVERecord?id=CVE-2026-42945" target="_blank" rel="noopener" data-linkindex="6" data-auth="NotApplicable"&gt;CVE-2026-42945&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;affecting the ngx_http_rewrite_module component in certain NGINX configurations. According to the official F5 advisory, the vulnerability may be triggered under specific conditions involving rewrite directives, unnamed PCRE capture groups, and replacement strings containing a question mark (?).&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;Following internal assessment and validation, Check Point confirms that Check Point-managed NGINX deployments are &lt;STRONG&gt;not affected&lt;/STRONG&gt; by this vulnerability. The impacted ngx_http_rewrite_module functionality and vulnerable rewrite configuration pattern are not utilized within the Check Point WAF architecture or request processing flow.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;All Check Point-managed NGINX deployments, including&lt;STRONG&gt; CloudGuard WAF SaaS, AppSec Gateway, and Unified Container configurations, are not vulnerable to this CVE&lt;/STRONG&gt;. Nevertheless, updated images including NGINX version 1.30.1 will be released shortly as part of our ongoing security and software maintenance process.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;Customers independently managing external or customer-owned NGINX infrastructure are strongly encouraged to upgrade their NGINX deployments to version 1.30.1 (or later) in accordance with the vendor’s security guidance and best practices.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;Check Point continuously monitors emerging vulnerabilities and security advisories as part of its ongoing product security and hardening processes.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;For any questions or additional guidance, please contact your Check Point representative. Check Point remains committed to keeping customers secure and staying ahead of emerging vulnerabilities.&lt;/P&gt;
&lt;P class="x_MsoNormal" aria-hidden="true"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 17:18:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/NGINX-CVE-2026-42945-Check-Point-Managed-NGINX-Deployments-Not/m-p/277141#M406</guid>
      <dc:creator>Vani</dc:creator>
      <dc:date>2026-05-19T17:18:03Z</dc:date>
    </item>
  </channel>
</rss>

