Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13986: CWE-434 Unrestricted Upload of File with Dangerous Type in Nagios Nagios XI

0
High
VulnerabilityCVE-2024-13986cvecve-2024-13986cwe-434cwe-22
Published: Thu Aug 28 2025 (08/28/2025, 15:49:46 UTC)
Source: CVE Database V5
Vendor/Project: Nagios
Product: Nagios XI

Description

Nagios XI < 2024R1.3.2 contains a remote code execution vulnerability by chaining two flaws: an arbitrary file upload and a path traversal in the Core Config Snapshots interface. The issue arises from insufficient validation of file paths and extensions during MIB upload and snapshot rename operations. Exploitation results in the placement of attacker-controlled PHP files in a web-accessible directory, executed as the www-data user.

AI-Powered Analysis

AILast updated: 11/18/2025, 18:32:04 UTC

Technical Analysis

CVE-2024-13986 affects Nagios XI versions prior to 2024R1.3.2 and involves a remote code execution vulnerability through the Core Config Snapshots interface. The vulnerability is a result of two chained issues: an arbitrary file upload vulnerability (CWE-434) and a path traversal vulnerability (CWE-22). The arbitrary file upload flaw allows an attacker to upload files without proper validation of file type or extension, while the path traversal flaw enables manipulation of file paths to place files outside intended directories. Together, these allow an attacker to upload malicious PHP scripts into web-accessible directories. When these scripts are accessed, they execute with the privileges of the web server user (www-data), enabling remote code execution. The vulnerability requires no user interaction and can be exploited remotely over the network with low privileges, making it highly dangerous. The lack of patch links suggests that a fix may be pending or recently released, so organizations must verify their Nagios XI version and update accordingly. This vulnerability compromises confidentiality, integrity, and availability by allowing attackers to execute arbitrary commands, potentially leading to full system takeover and lateral movement within the network.

Potential Impact

For European organizations, the impact of CVE-2024-13986 is significant, especially for those using Nagios XI to monitor critical infrastructure, enterprise networks, or industrial control systems. Successful exploitation can lead to unauthorized access, data theft, disruption of monitoring services, and potential pivoting to other internal systems. This could affect sectors such as finance, healthcare, energy, and government agencies that rely heavily on Nagios XI for operational continuity. The compromise of monitoring infrastructure undermines trust in security operations and can delay detection of further attacks. Additionally, given the high CVSS score and ease of exploitation, attackers could rapidly weaponize this vulnerability in targeted campaigns or automated attacks, increasing risk exposure across Europe.

Mitigation Recommendations

1. Immediately verify the Nagios XI version in use and upgrade to version 2024R1.3.2 or later where the vulnerability is patched. 2. If patching is not immediately possible, restrict access to the Core Config Snapshots interface to trusted administrators only via network segmentation and firewall rules. 3. Implement strict input validation and file type restrictions on all upload functionalities, ensuring only safe file types are accepted. 4. Monitor web server directories for unexpected PHP or executable files and remove any suspicious files promptly. 5. Employ web application firewalls (WAFs) with rules to detect and block path traversal and arbitrary file upload attempts. 6. Conduct regular audits of Nagios XI logs for unusual activity related to file uploads or configuration changes. 7. Educate administrators about the risks of this vulnerability and ensure secure operational practices around Nagios XI management. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-08-28T15:35:33.691Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a323af0ba78a05059954b

Added to database: 11/4/2025, 5:04:58 PM

Last enriched: 11/18/2025, 6:32:04 PM

Last updated: 12/20/2025, 5:22:36 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats