Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34323: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios Log Server

0
High
VulnerabilityCVE-2025-34323cvecve-2025-34323cwe-732
Published: Mon Nov 17 2025 (11/17/2025, 17:48:28 UTC)
Source: CVE Database V5
Vendor/Project: Nagios
Product: Log Server

Description

Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to a combination of sudo misconfiguration and group-writable application directories. The 'www-data' user is a member of the 'nagios' group, which has write access to '/usr/local/nagioslogserver/scripts', while several scripts in this directory are owned by root and may be executed via sudo without a password. A local attacker running as 'www-data' can move one of these root-owned scripts to a backup name and create a replacement script with attacker-controlled content at the original path, then invoke it with sudo. This allows arbitrary commands to be executed with root privileges, providing full compromise of the underlying operating system.

AI-Powered Analysis

AILast updated: 12/01/2025, 18:34:10 UTC

Technical Analysis

CVE-2025-34323 is a local privilege escalation vulnerability identified in Nagios Log Server versions prior to 2026R1.0.1. The root cause is a combination of sudo misconfiguration and overly permissive group-writable directories. Specifically, the 'www-data' user, commonly used by web services, is a member of the 'nagios' group, which has write permissions on the '/usr/local/nagioslogserver/scripts' directory. Several scripts within this directory are owned by root and configured to be executable via sudo without requiring a password. An attacker with local access as 'www-data' can rename an existing root-owned script to a backup name and place a malicious script in its place. When the attacker invokes the script via sudo, the malicious code executes with root privileges, allowing arbitrary command execution and full system compromise. This vulnerability is classified under CWE-732, indicating incorrect permission assignment for critical resources. The CVSS 4.0 base score is 8.5, reflecting high severity due to the ease of exploitation (low attack complexity), no need for user interaction, and the significant impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability is critical for environments where Nagios Log Server is deployed. The vulnerability affects only local attackers with some privileges but no authentication bypass or remote exploitation is indicated. The root cause is a misconfiguration that can be remediated by correcting directory permissions and sudo rules.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those relying on Nagios Log Server for monitoring critical IT infrastructure. Successful exploitation results in full root access on the affected system, enabling attackers to manipulate logs, disable security controls, install persistent backdoors, or pivot to other network segments. This compromises the confidentiality, integrity, and availability of monitored systems and data. Given Nagios Log Server’s role in security and operational monitoring, attackers could blind defenders by tampering with logs or alerting mechanisms. Industries such as finance, energy, telecommunications, and government agencies in Europe, which often use Nagios for monitoring, face heightened risk. The local nature of the attack means initial access is required, but insider threats or attackers who have compromised a low-privilege web service account could escalate privileges rapidly. The impact extends beyond the single host, potentially affecting entire networks and critical services. The absence of known exploits in the wild provides a window for proactive mitigation.

Mitigation Recommendations

European organizations should immediately upgrade Nagios Log Server to version 2026R1.0.1 or later where this vulnerability is patched. Until patching is possible, administrators must audit and restrict permissions on the '/usr/local/nagioslogserver/scripts' directory to remove group write access, ensuring only root can modify scripts. Review and tighten sudoers configurations to require passwords or restrict which scripts can be executed without a password, especially for the 'www-data' and 'nagios' groups. Implement file integrity monitoring on critical script directories to detect unauthorized changes. Limit local access to systems running Nagios Log Server by enforcing strict access controls and network segmentation. Employ least privilege principles for service accounts and regularly review group memberships to prevent unnecessary permissions. Conduct internal audits to detect any signs of exploitation or suspicious script modifications. Finally, enhance logging and alerting for sudo command executions to quickly identify potential abuse attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.585Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b639ec08982598af882b0

Added to database: 11/17/2025, 6:04:14 PM

Last enriched: 12/1/2025, 6:34:10 PM

Last updated: 1/7/2026, 8:52:03 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats