Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-9331 | A Broken Access Control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows low-privilege users with "Read-Only" access to perform administrative actions, including stopping system services and deleting critical resources. This flaw arises due to improper authorization enforcement, enabling unauthorized modifications that compromise system integrity and availability. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nagios network Analyzer
|
|
CPEs | cpe:2.3:a:nagios:network_analyzer:2024:r1.0.3:*:*:*:*:*:* | |
Vendors & Products |
Nagios nagios Network Analyzer
|
Nagios network Analyzer
|
Fri, 20 Jun 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nagios
Nagios nagios Network Analyzer |
|
CPEs | cpe:2.3:a:nagios:nagios_network_analyzer:2024:r1.0.3:*:*:*:*:*:* | |
Vendors & Products |
Nagios
Nagios nagios Network Analyzer |
Tue, 01 Apr 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-285 | |
Metrics |
cvssV3_1
|
Tue, 01 Apr 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Broken Access Control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows low-privilege users with "Read-Only" access to perform administrative actions, including stopping system services and deleting critical resources. This flaw arises due to improper authorization enforcement, enabling unauthorized modifications that compromise system integrity and availability. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-01T19:47:57.917Z
Reserved: 2025-03-11T00:00:00.000Z
Link: CVE-2025-28131

Updated: 2025-04-01T19:47:24.471Z

Status : Analyzed
Published: 2025-04-01T17:15:46.493
Modified: 2025-07-11T13:39:20.370
Link: CVE-2025-28131

No data.

No data.