F5's May 2026 QSN: Nineteen Highs, and what to patch first
Bill Church
May 13, 2026
F5 published its May 2026 Quarterly Security Notification on May 13. K000160932 contains nineteen High-severity CVEs spread across BIG-IP, BIG-IQ Centralized Management, BIG-IP Next (CNF, SPK, for Kubernetes), and the NGINX portfolio (Plus, Open Source, Instance Manager, F5 WAF for NGINX, NGINX App Protect WAF and DoS, F5 DoS for NGINX, NGINX Gateway Fabric, NGINX Ingress Controller). That's the largest single F5 QSN by High count in recent memory. Two findings dominate operationally. CVE-2026-41225 (iControl REST) scores 9.1 v3.1 in Appliance mode — the hardening posture customers chose specifically to constrain the management plane. CVE-2026-42945 (NGINX ngx_http_rewrite_module) scores 9.2 v4.0, and six NGINX-family products have no fixed version available as of publication: NGINX Instance Manager, F5 WAF for NGINX, NGINX App Protect WAF, F5 DoS for NGINX, NGINX App Protect DoS, NGINX Gateway Fabric, and NGINX Ingress Controller.
Before the per-CVE detail: a triage anchor that matters across the bulletin. F5 publishes both CVSS v3.1 and v4.0 base scores on every advisory now. On this bulletin, v4.0 runs systematically higher than v3.1. Eleven data-plane CVEs sit at 7.5 v3.1 paired with 8.7 v4.0. CVE-2026-42945 pairs 8.1 v3.1 with 9.2 v4.0. The v4.0 base-score methodology weights pre-authentication, network-vector flaws on traffic-handling appliances more honestly than v3.1 did, and the lift on this bulletin reflects that re-weighting rather than a scoring artifact. Triage on v4.0 where both are available. Patch-prioritization tooling that consumes v3.1 exclusively will under-rank items here.
Appliance mode is not behaving as an isolation boundary
Appliance mode removes Advanced shell access and restricts BIG-IP to its appliance role. Customers adopt it specifically to constrain the management-plane attack surface. Three CVEs in this QSN score higher in Appliance mode than in standard deployment — the opposite of the expected outcome. CVE-2026-41225 reaches 9.1 v3.1 in Appliance mode versus 7.2 standard. CVE-2026-42930 and CVE-2026-34176 are documented as Appliance-mode iControl REST flaws specifically. The technical reason is that several iControl REST and tmsh paths that Appliance mode locks down for normal operators are still reachable to an attacker who reaches the API authentication boundary, and the constrained environment changes the impact calculation in unexpected ways.
The operational implication is that Appliance mode is a hardening posture, not an isolation boundary. Customers who treated Appliance-mode adoption as a permanent risk-reduction measure should re-examine that assumption and continue layering network-level controls (management VLAN segregation, jump-host ACLs, client-certificate authentication) on top of the platform hardening. The next time someone in your organization argues that Appliance mode obviates the management VLAN, this bulletin is the counter-evidence.
The NGINX no-fix cluster is a decision, not a sprint
CVE-2026-42945 (ngx_http_rewrite_module) is the highest v4.0 score on the bulletin. F5 shipped fixes for NGINX Plus (37.0.0, R36 P4, R32 P6) and NGINX Open Source (1.30.1, 1.31.0). Six products in the NGINX family did not get fixes: NGINX Instance Manager, F5 WAF for NGINX, NGINX App Protect WAF, F5 DoS for NGINX, NGINX App Protect DoS, NGINX Gateway Fabric, and NGINX Ingress Controller. Customers running any of those will operate on mitigation, not patches, for the near term.
There are three operational paths, and the right answer depends on the deployment.
- Configuration mitigation. Audit every
rewritedirective for two patterns: regex capture groups ((...)) and inputs sourced from request URIs ($uri,$request_uri,$args, named captures from earlier matches). Remove the rewrites, restrict the regex to an exact-match pattern with no captures, or replace the logic withmapdirectives that have an explicit allowlist. Lowest residual risk; highest configuration cost; cannot be templated centrally. - WAF in front. Place a patched NGINX Plus instance (37.0.0, R36 P4, or R32 P6) in front of the no-fix product as a request-filtering layer. The patched instance handles the rewrite-module fix; the downstream no-fix product never sees the malicious request. Lowest configuration cost; requires an upstream Plus footprint that not every deployment has.
- Accept-with-monitoring. For low-exposure deployments — no public-facing URI handling, no externally-supplied input reaching rewrite directives, behind another already-patched WAF — document the residual exposure and monitor K000161019 for the eventual fix. Legitimate for the specific case where the cost of the other two options exceeds the residual risk. Not a default.
Five companion NGINX CVEs land in the Medium tier of the same QSN (CVE-2026-40460 in ngx_quic_module, CVE-2026-40701 in ngx_http_ssl_module, CVE-2026-42934 in ngx_http_charset_module, CVE-2026-42946 in the SCGI and uWSGI modules, CVE-2026-42926 in ngx_http_proxy_v2_module). Customers planning an NGINX patch sprint to address CVE-2026-42945 should bundle the Medium-tier items into the same change. Five NGINX module-parsing CVEs across rewrite, QUIC, SSL, charset, SCGI/uWSGI, and proxy-v2 in one quarter is itself a pattern worth noting, separate from any one fix.
The data-plane TMM cluster: one HA failover, one window
Eleven CVEs in this bulletin sit at 7.5 v3.1 / 8.7 v4.0 and target BIG-IP's traffic-management plane (TMM) or modules that run within it: TMM itself, SSL, SSL/TLS, two HTTP/2 paths (the L7 DoS Protection finding on Adv WAF/ASM and DDoS Hybrid Defender, plus general HTTP/2 on all modules), Advanced WAF/ASM, PEM iRules, DTLS, DNS Cache, SIP profile, and APM. All eleven are pre-authentication, network-vector, data-plane reachable.
The shared fixed-in versions are 21.0.0.1 or 21.0.0.2 on the 21.x train, 17.5.1.4 or 17.5.1.6 on 17.5, and 17.1.3.1 or 17.1.3.2 on 17.1. The exact pairings differ slightly across the cluster, but they're consistent enough that most customers will apply a single hotfix package and bring all eleven CVEs to remediated status in one HA failover. Change-management leadership should treat the cluster as a single item. Splitting it across multiple windows for "easier rollback" multiplies the change-control overhead without reducing risk, because the rollback unit on BIG-IP is the hotfix package, not the individual CVE.
If you terminate HTTP/2 on the data plane, use the same change window to review HTTP/2 configuration regardless of patch status — connection limits, stream limits, rate-limiting, and the timeout settings that govern half-open streams. Two HTTP/2 findings in one QSN, including one specifically against the L7 DoS Protection feature, says the HTTP/2 protocol surface is still active research territory.
The Glasswing / Mythos question
This QSN does not arrive in isolation. The first half of 2026 has produced an unusually dense schedule of high-severity disclosures across multiple vendors:
- May 13 — F5 May 2026 QSN, nineteen Highs, today's subject
- May 7 — Dirty Frag, two Linux kernel LPE CVEs (CVE-2026-43284 and CVE-2026-43500), covered in TRG-SA-2026-004
- May 5 — Palo Alto Networks User-ID Authentication Portal RCE (CVE-2026-0300), covered in TRG-SA-2026-003
- April 29 — Copy Fail, Linux kernel
algif_aeadLPE (CVE-2026-31431), covered in TRG-SA-2026-002 - March 27 — F5 BIG-IP APM RCE reclassification (CVE-2025-53521), covered in TRG-SA-2026-001
Five major disclosures across three major vendors in roughly six weeks. That cadence is outside what most customer organizations were sized for. The pattern is temporally consistent with Anthropic's public reporting on AI-assisted state-sponsored cyber operations, which Anthropic has published under the campaign names Glasswing and Mythos. AI-accelerated vulnerability research and exploit development changes the ratio between "found" and "weaponized" in ways that defenders who anchor on pre-2025 disclosure-rate baselines will systematically under-prepare for.
This is a pattern hypothesis, not attribution. No vendor — F5, Palo Alto Networks, Canonical, Red Hat, Anthropic — has connected any specific disclosure in this set to that campaign activity. We have no first-party evidence connecting them either. The honest position is that the cadence is what it is, and the cause may turn out to be AI-assisted actor activity, an artifact of post-incident audit cycles at individual vendors after the October 2025 F5 security incident, or coincidence. The actionable read for fleet operators is the same regardless of cause: organizations whose patching cadence, staffing model, and change-management throughput were sized for the pre-2025 disclosure rate should treat the current cadence as the new normal until proven otherwise. The August 2026 F5 QSN, the next round of Linux kernel disclosures, and the next out-of-cycle Palo Alto or Cisco event will land on whatever runbook your team is operating with today.
Where Tailwind stands
We've published the full operational advisory, TRG-SA-2026-005, with the Tailwind Triage Matrix sequencing all nineteen Highs, the three-option decision tree for the no-fix NGINX cluster, the data-plane TMM bundling guidance, a complete CVE appendix with clickable links to every F5 KB article, and our analysis of what the Appliance-mode pattern, the v3.1-to-v4.0 lift, the Q1–Q2 2026 disclosure cadence, and the post-incident context (October 2025 F5 security incident, CISA ED 26-01) imply for customer fleets. Customers who purchased F5 BIG-IP, BIG-IQ, BIG-IP Next, or NGINX licensing through Tailwind have received it directly. If you are not on our customer list and want a copy, request it here — we read every request and respond directly.
For customers asking us to assist with the rollout: this QSN is wider than it is deep, and the work is mostly sequencing rather than novel investigation. We can help with the patch sequencing across BIG-IP, BIG-IP Next, BIG-IQ, and the NGINX fleet (including the no-fix-product decision for each affected NGINX deployment), the Appliance-mode posture re-examination, the configuration audit for rewrite directives in support of CVE-2026-42945 mitigation, and the change-management framing for the data-plane TMM cluster as a single bundled change rather than eleven separate tickets. We are also tracking F5's KB updates against our customers' fleets and will issue a Rev.A advisory when fixes ship for the currently no-fix NGINX products or when material reclassifications land.
The right operational stance for this QSN is the same one we recommended for Copy Fail, Dirty Frag, and CVE-2026-0300 in the preceding weeks: assume the cadence continues, treat each disclosure on its merits, and resist the temptation to either over-claim attribution or under-react to a pattern that is now several data points long. The parent F5 article K000160932 is the authoritative live source for affected and fixed versions as F5 updates child KBs over the coming weeks; this Tailwind advisory is a point-in-time interpretation and will be revised only on material changes.