Discovery of a Long-Standing Vulnerability
In early 2025, DepthFirst AI discovered CVE-2026-42945, a heap buffer overflow vulnerability in Nginx's ngx_http_rewrite_module. This flaw had existed undetected since 2006, affecting versions 0.6.27 through 1.30.0. With a CVSS score of 9.2, this critical vulnerability could allow remote code execution on affected servers. F5 released patches in versions 1.31.0 and 1.30.1.
The significance lies in the discovery method: an LLM-powered platform found what 18 years of traditional security research, bug bounties, and manual code review had missed.
Timeline of Events
2006: Vulnerability introduced in Nginx version 0.6.27 during development of the HTTP rewrite module.
2006-2024: Nginx becomes one of the world's most widely deployed web servers. The vulnerability remains undetected through numerous security audits, penetration tests, and code reviews.
Early 2025: DepthFirst AI's automated platform identifies the heap buffer overflow condition.
2025: F5 confirms the vulnerability, assigns CVE-2026-42945, and releases patches for both open-source Nginx and commercial Nginx Plus.
Identifying Gaps in Existing Controls
Static Analysis Tools: Traditional SAST tools scan for known vulnerability patterns. This overflow condition fell outside those patterns, or the tools lacked sufficient context about how the rewrite module handles malformed input.
Security-Focused Code Review: Manual reviews occurred—Nginx is open source with active contributors. However, reviewers missed the specific input validation flaw in the rewrite module. The code likely appeared safe under normal usage patterns.
Fuzzing Coverage: Fuzzing tests software with malformed inputs to trigger crashes. Either this module wasn't fuzzed comprehensively, or the specific input combination that triggers the overflow wasn't generated.
Vendor Security Testing: F5's commercial testing processes didn't catch this in Nginx Plus, despite having resources beyond the open-source project.
These gaps highlight the limitations of existing detection methods against complex, context-dependent vulnerabilities.
Relevant Standards and Requirements
NIST 800-53, RA-5 (Vulnerability Monitoring and Scanning): Requires organizations to scan for vulnerabilities in systems and applications, update scanning tools and techniques, and remediate legitimate vulnerabilities based on risk assessment. Your scanning methods must evolve.
PCI DSS v4.0.1, Requirement 6.3.2: States that security vulnerabilities are identified using industry-recognized sources and that risk rankings are assigned to vulnerabilities. When a critical vulnerability like CVE-2026-42945 appears, you have 30 days to address high-risk vulnerabilities per Requirement 6.3.1.
ISO/IEC 27001:2022, Control 8.8 (Management of Technical Vulnerabilities): Requires organizations to obtain timely information about technical vulnerabilities, evaluate exposure, and take appropriate action.
OWASP ASVS v4.0.3, V14.2 (Dependency): Addresses component analysis and keeping components updated. While this vulnerability is in Nginx itself rather than a dependency, the principle applies: you must track versions of all software in your stack and have a process to update when patches release.
These standards assume human-paced vulnerability disclosure. When AI accelerates discovery, your response window doesn't change—but the volume of findings will.
Action Items for Your Team
Audit Your Nginx Deployment: Run nginx -v on every server. If you're running anything between 0.6.27 and 1.30.0, you're vulnerable. Schedule the upgrade to 1.31.0 (or 1.30.1 if you need to stay on the 1.30 branch). If you're running Nginx Plus, apply F5's patches.
Expand Vulnerability Intelligence Sources: Add AI security research firms to your monitoring. DepthFirst AI isn't the only group using LLMs for vulnerability discovery. Subscribe to their advisories as you monitor CISA KEV or vendor security bulletins.
Reassess SAST Tool Assumptions: If your static analysis pipeline didn't flag this pattern, what else is it missing? Test your tools against CVE-2026-42945's specific conditions. Consider adding AI-augmented analysis to your pipeline—not as a replacement, but as an additional layer.
Update Patch Management SLAs: When AI finds a flaw that's been exploitable for 18 years, assume others will weaponize it quickly. Your 30-day window for high-severity patches might need internal tightening to 7-14 days for critical RCE vulnerabilities in internet-facing services.
Document in Your Risk Register: The existence of an 18-year-old critical flaw in mature, audited software changes your threat model. Log this incident as evidence that "mature open-source projects" doesn't mean "fully vetted code." Use it to justify expanded testing budgets.
Test Rollback Procedures: Patching Nginx in production can break configurations, especially if you use complex rewrite rules. Before you patch, verify you can roll back cleanly. Stage the update in pre-prod, test your specific rewrite configurations, then schedule production updates with a rollback plan.
For Compliance Auditors: When your auditor asks how you identify vulnerabilities, you can now point to AI-discovered CVEs as proof that traditional methods have gaps. Use this to justify tool additions or expanded testing scope.
The reality is that if AI found this in Nginx, it will find similar flaws in your other long-trusted components. The question isn't whether AI changes vulnerability management—it's whether your program adapts before the next critical CVE drops.
CVE Details



