CVE-2025-34288
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nagios | nagios_xi | to 2024 (inc) |
| nagios | nagios_xi | 2026 |
| nagios | nagios_xi | 2026 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Nagios XI versions prior to 2026R1.1 allows a local attacker with access to the application account to escalate their privileges to root. It occurs because a maintenance script that runs as root via sudo includes an application file writable by a lower-privileged user. The attacker can modify this file to insert malicious code, which is then executed with root privileges when the script runs.
How can this vulnerability impact me? :
The vulnerability can lead to arbitrary code execution as the root user, meaning an attacker can gain full control over the affected system. This can result in unauthorized access, data manipulation, system compromise, and potentially further attacks within the network.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update Nagios XI to version 2026R1.1 or later, as versions prior to this are vulnerable. Additionally, review and restrict sudo permissions to prevent execution of maintenance scripts by unauthorized users. Ensure that application files used by sudo commands are not writable by lower-privileged users to prevent malicious code injection.