No analysis available yet.
Vendor Solution
Nagios addresses this vulnerability as "Fixed privilege escalation vulnerability in getprofile.sh."
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 05 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios nagios Xi
|
|
| CPEs | cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nagios nagios Xi
|
|
| Metrics |
cvssV3_1
|
Fri, 31 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios xi |
|
| Vendors & Products |
Nagios
Nagios xi |
Thu, 30 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios XI versions prior to 5.7.3 contain a privilege escalation vulnerability in the getprofile.sh helper script. The script performed profile retrieval and initialization routines using insecure file/command handling and insufficient validation of attacker-controlled inputs, and in some deployments executed with elevated privileges. A local attacker with low-level access could exploit these weaknesses to cause the script to execute arbitrary commands or modify privileged files, resulting in privilege escalation. | |
| Title | Nagios XI < 5.7.3 Privilege escalation via Insecure getprofile.sh Script | |
| Weaknesses | CWE-250 CWE-73 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-17T18:21:41.468Z
Reserved: 2025-10-30T14:33:17.565Z
Link: CVE-2020-36868
Updated: 2025-10-31T13:06:01.252Z
Status : Analyzed
Published: 2025-10-30T22:15:39.837
Modified: 2025-11-05T18:23:19.037
Link: CVE-2020-36868
No data.
OpenCVE Enrichment
Updated: 2025-10-31T10:12:59Z