VulnerabilitiesHIGH

Node.js Vulnerabilities - Critical Patches Released

CSCyber Security News
CVE-2026-21637CVE-2026-21714CVE-2026-21717Node.jsTLS
🎯

Basically, Node.js fixed serious bugs that could crash servers or let attackers disrupt services.

Quick Summary

Node.js has released critical patches for multiple vulnerabilities, including risks of DoS attacks and process crashes. Users must upgrade to secure their systems immediately. These updates are vital for maintaining server stability and security.

The Flaw

On March 24, 2026, the Node.js project released a critical security update for its Long-Term Support (LTS) branch, marking version 20.20.2 as a security release. This update addresses seven vulnerabilities, some of which can be exploited remotely without authentication. The most critical issue, CVE-2026-21637, involves a flaw in TLS error handling that can lead to a process crash.

The vulnerability allows exceptions to bypass TLS error handlers, causing the Node.js process to terminate unexpectedly. This is a significant concern for any server operating on the affected Node.js versions (20.x, 22.x, 24.x, or 25.x) that utilize SNICallback. The fix introduces a try/catch block to handle these exceptions properly, preventing crashes from unexpected server name values.

What's at Risk

In addition to the TLS flaw, several other vulnerabilities pose risks. CVE-2026-21714 affects HTTP/2 servers and can lead to resource exhaustion due to unhandled flow control errors. If exploited, a malicious client can send malformed WINDOW_UPDATE frames, resulting in a memory leak and potential denial-of-service (DoS) conditions.

Another vulnerability, CVE-2026-21717, targets the V8 engine's string hashing mechanism. By crafting specific payloads, attackers can create hash collisions that degrade the performance of the Node.js process, leading to a classic HashDoS attack. These vulnerabilities highlight the critical need for developers and system administrators to stay vigilant and apply updates promptly.

Patch Status

The Node.js team has released patches for the identified vulnerabilities. Users are encouraged to upgrade to the latest versions: v20.20.2, v22.22.2, v24.14.1, or v25.8.2. The patch for CVE-2026-21637 is particularly urgent, as it requires no authentication and can directly cause process termination.

Other vulnerabilities, such as CVE-2026-21713, which involves a timing side-channel in HMAC verification, also received fixes. This flaw could allow attackers to infer HMAC values based on timing information, making it crucial to implement the patch to maintain cryptographic integrity.

Immediate Actions

Developers and system administrators should prioritize upgrading their Node.js installations to the patched versions. Given the potential for remote exploitation and service disruption, environments hosting publicly accessible TLS servers must treat this update as a critical priority.

Installers and binaries are available across various platforms, including Windows, macOS, and Linux. Following best practices for software updates and monitoring for unusual activity can help mitigate the risks posed by these vulnerabilities. Stay informed and ensure your systems are secure against evolving threats.

🔒 Pro insight: The urgency of these patches reflects a growing trend in exploiting TLS vulnerabilities; immediate action is essential to prevent potential service disruptions.

Original article from

Cyber Security News · Guru Baran

Read Full Article

Related Pings

HIGHVulnerabilities

Citrix Vulnerabilities - Urgent Patch Required for NetScaler

Citrix has identified critical vulnerabilities in its NetScaler products. With thousands of instances exposed, immediate patching is essential to prevent data theft. Stay secure by updating your systems now.

BleepingComputer·
HIGHVulnerabilities

TP-Link Archer NX Routers - Critical Firmware Vulnerability Alert

TP-Link has patched a critical vulnerability in Archer NX routers that could allow attackers to take control. Users must update their firmware to protect their devices. This flaw poses significant risks, especially if left unaddressed.

Security Affairs·
HIGHVulnerabilities

Firefox 149 - Patch Released for 37 High-Risk Vulnerabilities

Mozilla's Firefox 149 just dropped a major update, fixing 37 vulnerabilities that could allow remote attacks. Users must update now to stay safe from these risks. Don't wait—secure your browser today!

Cyber Security News·
HIGHVulnerabilities

Vulnerabilities Fixed in iOS, macOS 26.4 Security Updates

Apple has released crucial security updates for iOS and macOS, fixing over 80 vulnerabilities. Users must update their devices to protect their data and privacy. Stay secure by ensuring your software is up to date.

SecurityWeek·
HIGHVulnerabilities

AWS Vulnerability - Local File Inclusion Risk Exposed

A serious Local File Inclusion vulnerability in AWS Remote MCP Server has been discovered, allowing file access to authenticated users. This poses a risk of sensitive data exposure. AWS users must upgrade to the latest version to safeguard their systems.

Varonis Blog·
HIGHVulnerabilities

NGINX Plus Vulnerability - Code Execution Risk from MP4 Files

A new vulnerability in NGINX Plus and Open Source could allow attackers to execute code via malicious MP4 files. This high-severity flaw affects many systems, requiring urgent updates. Security teams must act quickly to mitigate risks and protect their infrastructure.

Cyber Security News·