Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34323: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios Log Server

0
High
VulnerabilityCVE-2025-34323cvecve-2025-34323cwe-732
Published: Mon Nov 17 2025 (11/17/2025, 17:48:28 UTC)
Source: CVE Database V5
Vendor/Project: Nagios
Product: Log Server

Description

Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to a combination of sudo misconfiguration and group-writable application directories. The 'www-data' user is a member of the 'nagios' group, which has write access to '/usr/local/nagioslogserver/scripts', while several scripts in this directory are owned by root and may be executed via sudo without a password. A local attacker running as 'www-data' can move one of these root-owned scripts to a backup name and create a replacement script with attacker-controlled content at the original path, then invoke it with sudo. This allows arbitrary commands to be executed with root privileges, providing full compromise of the underlying operating system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:03:32 UTC

Technical Analysis

CVE-2025-34323 is a local privilege escalation vulnerability affecting Nagios Log Server versions prior to 2026R1.0.1. The root cause is a combination of sudo misconfiguration and overly permissive file system permissions. Specifically, the 'www-data' user, which is part of the 'nagios' group, has write access to the directory '/usr/local/nagioslogserver/scripts'. Several scripts in this directory are owned by root and configured to be executed via sudo without requiring a password. An attacker with local access as 'www-data' can rename an existing root-owned script to a backup name and create a malicious replacement script at the original path. When the attacker invokes the script through sudo, the malicious code executes with root privileges, enabling arbitrary command execution and full control over the underlying operating system. This vulnerability is classified under CWE-732, indicating incorrect permission assignment for a critical resource. The CVSS 4.0 base score is 8.5, reflecting high severity due to ease of exploitation (local access only), no user interaction required, and significant impact on confidentiality, integrity, and availability. No known public exploits have been reported yet, but the vulnerability poses a serious risk in environments where Nagios Log Server is deployed and accessible to untrusted local users.

Potential Impact

The impact of CVE-2025-34323 is severe for organizations using vulnerable versions of Nagios Log Server. Successful exploitation grants an attacker root-level access on the host system, allowing complete control over the operating system. This can lead to unauthorized data access, system manipulation, installation of persistent malware, disruption of monitoring services, and lateral movement within the network. Since Nagios Log Server is often deployed in critical IT infrastructure monitoring roles, compromise could undermine the integrity and availability of monitoring data, delaying detection of other attacks or failures. The vulnerability requires local access, so insider threats or attackers who have already gained limited access to the system are primary risks. However, in multi-tenant or shared environments, this could enable privilege escalation to full system compromise. The broad impact on confidentiality, integrity, and availability, combined with the ease of exploitation, makes this a critical concern for affected organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2025-34323, organizations should immediately upgrade Nagios Log Server to version 2026R1.0.1 or later where the issue is resolved. In the absence of an available patch, administrators should: 1) Restrict write permissions on '/usr/local/nagioslogserver/scripts' to trusted users only, removing group write access for 'nagios' or 'www-data'. 2) Audit and tighten sudoers configurations to ensure that scripts executed with elevated privileges cannot be replaced or modified by non-privileged users. 3) Implement file integrity monitoring on critical script directories to detect unauthorized changes. 4) Limit local access to the 'www-data' user and monitor for unusual activity or privilege escalation attempts. 5) Employ mandatory access controls (e.g., SELinux or AppArmor) to restrict script execution and file modifications. 6) Conduct regular security reviews of permissions and sudo configurations in the Nagios environment. These steps reduce the attack surface and prevent exploitation even if an attacker gains local access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.585Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b639ec08982598af882b0

Added to database: 11/17/2025, 6:04:14 PM

Last enriched: 2/27/2026, 5:03:32 AM

Last updated: 3/21/2026, 12:23:45 AM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses