F5 Networks Nginx Instance Manager
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in F5 Networks Nginx Instance Manager.
By the Year
In 2025 there have been 0 vulnerabilities in F5 Networks Nginx Instance Manager. Last year, in 2024 Nginx Instance Manager had 1 security vulnerability published. Right now, Nginx Instance Manager is on track to have less security vulnerabilities in 2025 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 1 | 5.40 |
2023 | 3 | 6.90 |
2022 | 1 | 6.50 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Nginx Instance Manager vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent F5 Networks Nginx Instance Manager Security Vulnerabilities
NGINX OIDC Session Fixation Vulnerability
CVE-2024-10318
5.4 - Medium
- November 06, 2024
A session fixation issue was discovered in the NGINX OpenID Connect reference implementation, where a nonce was not checked at login time. This flaw allows an attacker to fix a victim's session to an attacker-controlled account. As a result, although the attacker cannot log in as the victim, they can force the session to associate it with the attacker-controlled account, leading to potential misuse of the victim's session.
Session Fixation
NGINX Management Suite default file permissions are set such
CVE-2023-28724
7.1 - High
- May 03, 2023
NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Incorrect Default Permissions
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment
CVE-2023-28656
8.1 - High
- May 03, 2023
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Insecure Direct Object Reference / IDOR
Insertion of Sensitive Information into log file vulnerability in NGINX Agent
CVE-2023-1550
5.5 - Medium
- March 29, 2023
Insertion of Sensitive Information into log file vulnerability in NGINX Agent. NGINX Agent version 2.0 before 2.23.3 inserts sensitive information into a log file. An authenticated attacker with local access to read agent log files may gain access to private keys. This issue is only exposed when the non-default trace level logging is enabled. Note: NGINX Agent is included with NGINX Instance Manager and used in conjunction with NGINX API Connectivity Manager, and NGINX Management Suite Security Monitoring.
Insertion of Sensitive Information into Log File
In versions 2.x before 2.3.1 and all versions of 1.x, when NGINX Instance Manager is in use, undisclosed requests
CVE-2022-35241
6.5 - Medium
- August 04, 2022
In versions 2.x before 2.3.1 and all versions of 1.x, when NGINX Instance Manager is in use, undisclosed requests can cause an increase in disk resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Resource Exhaustion
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for F5 Networks Nginx Instance Manager or by F5 Networks? Click the Watch button to subscribe.