Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 17 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios log Server |
|
| CPEs | cpe:2.3:a:nagios:log_server:2026:*:*:*:*:*:*:* | |
| Vendors & Products |
Nagios
Nagios log Server |
Mon, 17 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 17 Nov 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to unsafe interaction between sudo rules and file system permissions. The web server account is granted passwordless sudo access to certain maintenance scripts while also being a member of a group that has write access to the directory containing those scripts. A local attacker running as the web server user can replace one of the permitted scripts with a malicious program and then execute it via sudo, resulting in arbitrary code execution with root privileges. | |
| Title | Nagios Log Server < 2026R1.0.1 Local Privilege Escalation via Writable Scripts and Sudo Rules | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-18T04:55:23.236Z
Reserved: 2025-04-15T19:15:22.585Z
Link: CVE-2025-34323
Updated: 2025-11-17T18:23:51.837Z
Status : Received
Published: 2025-11-17T18:15:56.880
Modified: 2025-11-17T18:15:56.880
Link: CVE-2025-34323
No data.
OpenCVE Enrichment
No data.