Linux Distros Unpatched Vulnerability : CVE-2026-27135

high Nessus Plugin ID 302948

Synopsis

The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.

Description

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.

- nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application.
They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available. (CVE-2026-27135)

Note that Nessus relies on the presence of the package as reported by the vendor.

Solution

There is no known solution at this time.

See Also

https://access.redhat.com/security/cve/cve-2026-27135

https://security-tracker.debian.org/tracker/CVE-2026-27135

https://ubuntu.com/security/CVE-2026-27135

Plugin Details

Severity: High

ID: 302948

File Name: unpatched_CVE_2026_27135.nasl

Version: 1.3

Type: local

Agent: unix

Family: Misc.

Published: 3/18/2026

Updated: 3/20/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2026-27135

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:nghttp2, p-cpe:/a:centos:centos:nodejs24-libs, cpe:/o:debian:debian_linux:14.0, p-cpe:/a:centos:centos:nodejs-libs, p-cpe:/a:centos:centos:nodejs-npm, cpe:/o:centos:centos:8, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, p-cpe:/a:centos:centos:nodejs-devel, p-cpe:/a:redhat:enterprise_linux:nodejs-devel, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:redhat:enterprise_linux:nodejs24-devel, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:redhat:enterprise_linux:libnghttp2, p-cpe:/a:canonical:ubuntu_linux:nghttp2, p-cpe:/a:redhat:enterprise_linux:nodejs-docs, p-cpe:/a:redhat:enterprise_linux:nodejs, p-cpe:/a:centos:centos:nodejs-full-i18n, p-cpe:/a:centos:centos:v8-13.6-devel, p-cpe:/a:redhat:enterprise_linux:nodejs24-docs, p-cpe:/a:redhat:enterprise_linux:libnghttp2-devel, p-cpe:/a:centos:centos:nodejs24-full-i18n, p-cpe:/a:centos:centos:v8-12.4-devel, p-cpe:/a:centos:centos:nodejs-packaging-bundler, p-cpe:/a:centos:centos:nodejs24-npm, p-cpe:/a:redhat:enterprise_linux:v8-13.6-devel, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:10, p-cpe:/a:centos:centos:nodejs-nodemon, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:redhat:enterprise_linux:nodejs-packaging, p-cpe:/a:redhat:enterprise_linux:nodejs-libs, p-cpe:/a:centos:centos:nodejs24-devel, cpe:/o:canonical:ubuntu_linux:25.10, cpe:/o:debian:debian_linux:13.0, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:nodejs-full-i18n, p-cpe:/a:redhat:enterprise_linux:nodejs-packaging-bundler, p-cpe:/a:centos:centos:nodejs24, p-cpe:/a:centos:centos:libnghttp2, p-cpe:/a:centos:centos:libnghttp2-devel, p-cpe:/a:redhat:enterprise_linux:npm, p-cpe:/a:centos:centos:npm, p-cpe:/a:centos:centos:nghttp2, p-cpe:/a:centos:centos:nodejs-docs, p-cpe:/a:centos:centos:nodejs22, p-cpe:/a:redhat:enterprise_linux:nodejs24-full-i18n, p-cpe:/a:redhat:enterprise_linux:nodejs24-npm, p-cpe:/a:redhat:enterprise_linux:nodejs-npm, p-cpe:/a:redhat:enterprise_linux:v8-12.4-devel, p-cpe:/a:debian:debian_linux:nghttp2, p-cpe:/a:redhat:enterprise_linux:nodejs24, p-cpe:/a:redhat:enterprise_linux:nodejs22, p-cpe:/a:centos:centos:nodejs, p-cpe:/a:centos:centos:nodejs-packaging, p-cpe:/a:redhat:enterprise_linux:nodejs-nodemon, p-cpe:/a:redhat:enterprise_linux:nodejs24-libs, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:centos:centos:nodejs24-docs

Required KB Items: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 3/18/2026

Reference Information

CVE: CVE-2026-27135