<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New NGINX Vulnerability (CVE-2026-8711): Check Point-Managed NGINX Deployments Not Affected in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/New-NGINX-Vulnerability-CVE-2026-8711-Check-Point-Managed-NGINX/m-p/277266#M407</link>
    <description>&lt;P&gt;&lt;FONT face="arial black,avant garde"&gt;&lt;STRONG data-olk-copy-source="MessageBody"&gt;Description&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;A recently disclosed vulnerability affecting NGINX JavaScript (njs) has generated industry attention due to the potential for buffer overflow conditions in vulnerable deployments.&lt;/P&gt;
&lt;P&gt;The vulnerability impacts NGINX JavaScript (njs) versions 0.9.4 through 0.9.8, with remediation introduced in njs version 0.9.9. Public reporting indicates that vulnerable environments may be exposed to denial-of-service conditions and, under certain circumstances, possible remote code execution.&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;&lt;STRONG&gt;Check Point Statement Regarding NGINX Vulnerability CVE-2026-8711&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Check Point-managed NGINX deployments are not affected by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A id="OWA346cc779-13f5-7871-0aa0-e8d8f248d9d6" class="x_OWAAutoLink" title="https://www.cve.org/CVERecord?id=CVE-2026-8711" href="https://www.cve.org/CVERecord?id=CVE-2026-8711" data-linkindex="0" data-auth="NotApplicable" target="_blank"&gt;CVE-2026-8711&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The vulnerability affects NGINX JavaScript (njs) versions 0.9.4 through 0.9.8. Check Point-managed deployments use a version outside the affected range and do not contain the vulnerable code path associated with this issue.&lt;/P&gt;
&lt;P&gt;At this time, no action is required for customers using Check Point-managed NGINX deployments.&lt;/P&gt;
&lt;P&gt;Nevertheless, updated images including the latest supported NGINX components will be released shortly (the new release will be addressing both CVE-2026-8711 and CVE-2026-42945) as part of Check Point’s ongoing security and software maintenance process (see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A id="OWA426ff4c8-a501-02df-6124-afe9324bd662" class="x_OWAAutoLink" title="https://community.checkpoint.com/t5/WAF/NGINX-CVE-2026-42945-Check-Point-Managed-NGINX-Deployments-Not/td-p/277141" href="https://community.checkpoint.com/t5/WAF/NGINX-CVE-2026-42945-Check-Point-Managed-NGINX-Deployments-Not/td-p/277141" data-linkindex="1" data-auth="NotApplicable" target="_blank"&gt;Check Point’s statement on CVE-2026-42945&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;Organizations operating independently managed NGINX environments should review their deployed njs versions and apply vendor-recommended updates and mitigations where applicable.&lt;/P&gt;
&lt;P&gt;Check Point continues to monitor relevant security advisories and assess their potential impact on managed services and customer deployments.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;For any questions or additional guidance, please contact your Check Point representative. Check Point remains committed to keeping customers secure and staying ahead of emerging vulnerabilities.&lt;/P&gt;
&lt;P class="x_MsoNormal" aria-hidden="true"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 May 2026 08:27:49 GMT</pubDate>
    <dc:creator>Vani</dc:creator>
    <dc:date>2026-05-21T08:27:49Z</dc:date>
    <item>
      <title>New NGINX Vulnerability (CVE-2026-8711): Check Point-Managed NGINX Deployments Not Affected</title>
      <link>https://community.checkpoint.com/t5/WAF/New-NGINX-Vulnerability-CVE-2026-8711-Check-Point-Managed-NGINX/m-p/277266#M407</link>
      <description>&lt;P&gt;&lt;FONT face="arial black,avant garde"&gt;&lt;STRONG data-olk-copy-source="MessageBody"&gt;Description&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;A recently disclosed vulnerability affecting NGINX JavaScript (njs) has generated industry attention due to the potential for buffer overflow conditions in vulnerable deployments.&lt;/P&gt;
&lt;P&gt;The vulnerability impacts NGINX JavaScript (njs) versions 0.9.4 through 0.9.8, with remediation introduced in njs version 0.9.9. Public reporting indicates that vulnerable environments may be exposed to denial-of-service conditions and, under certain circumstances, possible remote code execution.&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;&lt;STRONG&gt;Check Point Statement Regarding NGINX Vulnerability CVE-2026-8711&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Check Point-managed NGINX deployments are not affected by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A id="OWA346cc779-13f5-7871-0aa0-e8d8f248d9d6" class="x_OWAAutoLink" title="https://www.cve.org/CVERecord?id=CVE-2026-8711" href="https://www.cve.org/CVERecord?id=CVE-2026-8711" data-linkindex="0" data-auth="NotApplicable" target="_blank"&gt;CVE-2026-8711&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The vulnerability affects NGINX JavaScript (njs) versions 0.9.4 through 0.9.8. Check Point-managed deployments use a version outside the affected range and do not contain the vulnerable code path associated with this issue.&lt;/P&gt;
&lt;P&gt;At this time, no action is required for customers using Check Point-managed NGINX deployments.&lt;/P&gt;
&lt;P&gt;Nevertheless, updated images including the latest supported NGINX components will be released shortly (the new release will be addressing both CVE-2026-8711 and CVE-2026-42945) as part of Check Point’s ongoing security and software maintenance process (see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A id="OWA426ff4c8-a501-02df-6124-afe9324bd662" class="x_OWAAutoLink" title="https://community.checkpoint.com/t5/WAF/NGINX-CVE-2026-42945-Check-Point-Managed-NGINX-Deployments-Not/td-p/277141" href="https://community.checkpoint.com/t5/WAF/NGINX-CVE-2026-42945-Check-Point-Managed-NGINX-Deployments-Not/td-p/277141" data-linkindex="1" data-auth="NotApplicable" target="_blank"&gt;Check Point’s statement on CVE-2026-42945&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;Organizations operating independently managed NGINX environments should review their deployed njs versions and apply vendor-recommended updates and mitigations where applicable.&lt;/P&gt;
&lt;P&gt;Check Point continues to monitor relevant security advisories and assess their potential impact on managed services and customer deployments.&lt;/P&gt;
&lt;P class="x_MsoNormal"&gt;For any questions or additional guidance, please contact your Check Point representative. Check Point remains committed to keeping customers secure and staying ahead of emerging vulnerabilities.&lt;/P&gt;
&lt;P class="x_MsoNormal" aria-hidden="true"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2026 08:27:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/New-NGINX-Vulnerability-CVE-2026-8711-Check-Point-Managed-NGINX/m-p/277266#M407</guid>
      <dc:creator>Vani</dc:creator>
      <dc:date>2026-05-21T08:27:49Z</dc:date>
    </item>
  </channel>
</rss>

