Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-d1c6-dt2p-9kaa
Vulnerability ID VCID-d1c6-dt2p-9kaa
Aliases CVE-2026-1642
Summary SSL upstream injection
Status Published
Exploitability 0.5
Weighted Severity 5.3
Risk 2.6
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1642.json
https://api.first.org/data/v1/epss?cve=CVE-2026-1642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://my.f5.com/manage/s/article/K000159824
1127053 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127053
2436738 https://bugzilla.redhat.com/show_bug.cgi?id=2436738
CVE-2026-1642 https://nvd.nist.gov/vuln/detail/CVE-2026-1642
RHSA-2026:3638 https://access.redhat.com/errata/RHSA-2026:3638
RHSA-2026:4235 https://access.redhat.com/errata/RHSA-2026:4235
RHSA-2026:4501 https://access.redhat.com/errata/RHSA-2026:4501
RHSA-2026:4705 https://access.redhat.com/errata/RHSA-2026:4705
RHSA-2026:4943 https://access.redhat.com/errata/RHSA-2026:4943
RHSA-2026:5581 https://access.redhat.com/errata/RHSA-2026:5581
RHSA-2026:5599 https://access.redhat.com/errata/RHSA-2026:5599
RHSA-2026:6182 https://access.redhat.com/errata/RHSA-2026:6182
RHSA-2026:6234 https://access.redhat.com/errata/RHSA-2026:6234
RHSA-2026:6235 https://access.redhat.com/errata/RHSA-2026:6235
RHSA-2026:6302 https://access.redhat.com/errata/RHSA-2026:6302
RHSA-2026:6311 https://access.redhat.com/errata/RHSA-2026:6311
RHSA-2026:6407 https://access.redhat.com/errata/RHSA-2026:6407
RHSA-2026:6408 https://access.redhat.com/errata/RHSA-2026:6408
RHSA-2026:6427 https://access.redhat.com/errata/RHSA-2026:6427
USN-8038-1 https://usn.ubuntu.com/8038-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1642.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://my.f5.com/manage/s/article/K000159824
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N Found at https://my.f5.com/manage/s/article/K000159824
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T16:01:47Z/ Found at https://my.f5.com/manage/s/article/K000159824
Exploit Prediction Scoring System (EPSS)
Percentile 0.03395
EPSS Score 0.00016
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:31:45.989334+00:00 Nginx Importer Import https://nginx.org/en/security_advisories.html 38.0.0