Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34273: CWE-863 Incorrect Authorization in Nagios Log Server

0
High
VulnerabilityCVE-2025-34273cvecve-2025-34273cwe-863
Published: Thu Oct 30 2025 (10/30/2025, 21:24:43 UTC)
Source: CVE Database V5
Vendor/Project: Nagios
Product: Log Server

Description

Nagios Log Server versions prior to 2024R2.0.3 contain an incorrect authorization vulnerability that allows non-administrator users to delete global dashboards. The application did not correctly enforce authorization checks for the global dashboard deletion workflow, enabling lower-privileged users to remove dashboards that affect other users or the overall monitoring UI.

AI-Powered Analysis

AILast updated: 10/30/2025, 21:56:57 UTC

Technical Analysis

CVE-2025-34273 is an authorization bypass vulnerability classified under CWE-863 (Incorrect Authorization) affecting Nagios Log Server versions prior to 2024R2.0.3. The vulnerability arises because the application fails to enforce proper authorization checks during the deletion of global dashboards, which are shared monitoring views accessible by multiple users. Specifically, non-administrator users with limited privileges can exploit this flaw to delete global dashboards, which should normally be restricted to administrators only. This unauthorized deletion can disrupt the monitoring environment by removing critical dashboards that provide visibility into system health and security events. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on integrity (VI:H) and low impact on availability (VA:L). The flaw does not affect confidentiality or scope. Although no public exploits are currently known, the ease of exploitation and the potential to impair monitoring operations make this a significant risk. Nagios Log Server is widely used for centralized log aggregation and monitoring, making this vulnerability particularly concerning for organizations relying on it for security and operational awareness.

Potential Impact

For European organizations, the impact of CVE-2025-34273 can be substantial. The unauthorized deletion of global dashboards compromises the integrity and availability of monitoring data, potentially leading to gaps in visibility of critical infrastructure and security events. This can delay incident detection and response, increasing the risk of undetected breaches or system failures. Organizations in sectors such as finance, telecommunications, energy, and government, which heavily depend on continuous monitoring, could face operational disruptions and compliance challenges. The vulnerability does not directly expose sensitive data but undermines trust in monitoring systems, which is crucial for maintaining security posture and regulatory compliance under frameworks like GDPR and NIS Directive. Additionally, the ease of exploitation without user interaction means attackers or malicious insiders could cause disruption remotely, increasing the threat surface.

Mitigation Recommendations

To mitigate CVE-2025-34273, organizations should immediately upgrade Nagios Log Server to version 2024R2.0.3 or later, where the authorization checks have been properly enforced. Until the patch is applied, restrict access to the Log Server interface to trusted administrators only, minimizing the number of users with dashboard deletion capabilities. Implement strict role-based access control (RBAC) policies to ensure that only authorized personnel can modify or delete global dashboards. Regularly audit user permissions and monitor dashboard changes for suspicious activity. Additionally, consider network segmentation and firewall rules to limit access to the Log Server management interface. Establish alerting mechanisms for unexpected dashboard deletions to enable rapid incident response. Finally, maintain up-to-date backups of dashboard configurations to facilitate quick restoration if unauthorized deletions occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.580Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6903db63aebfcd54749cd877

Added to database: 10/30/2025, 9:40:51 PM

Last enriched: 10/30/2025, 9:56:57 PM

Last updated: 10/31/2025, 8:02:36 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats