Access Control Flaw in Nagios Network Analyzer by Nagios
CVE-2025-28059
7.5HIGH
Key Information:
- Vendor
- Nagios
- Status
- Nagios Network Analyzer
- Vendor
- CVE Published:
- 18 April 2025
Summary
An access control flaw in Nagios Network Analyzer version 2024R1.0.3 permits former users to maintain access to system functionalities even after their accounts have been deleted. This vulnerability arises due to inadequate session termination and improper handling of expired API tokens, allowing unauthorized users to exploit leftovers of active sessions and gain access to sensitive operations. Administrators need to ensure that any user deletion triggers a complete invalidation of all associated sessions and API tokens.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published