Vulnerability Description
A Broken Access Control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows low-privilege users with "Read-Only" access to perform administrative actions, including stopping system services and deleting critical resources. This flaw arises due to improper authorization enforcement, enabling unauthorized modifications that compromise system integrity and availability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nagios | Network Analyzer | 2024 |
Related Weaknesses (CWE)
References
- https://github.com/harshal79/Privilege-Escalation-in-Nagios-Network-Analyzer.gitThird Party Advisory
- https://www.nagios.com/changelog/#network-analyzerRelease Notes
FAQ
What is CVE-2025-28131?
CVE-2025-28131 is a vulnerability with a CVSS score of 4.6 (MEDIUM). A Broken Access Control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows low-privilege users with "Read-Only" access to perform administrative actions, including stopping system services and...
How severe is CVE-2025-28131?
CVE-2025-28131 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-28131?
Check the references section above for vendor advisories and patch information. Affected products include: Nagios Network Analyzer.