Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to unsafe interaction between sudo rules and file system permissions. The web server account is granted passwordless sudo access to certain maintenance scripts while also being a member of a group that has write access to the directory containing those scripts. A local attacker running as the web server user can replace one of the permitted scripts with a malicious program and then execute it via sudo, resulting in arbitrary code execution with root privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 17 Nov 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Nagios
Nagios log Server
CPEs cpe:2.3:a:nagios:log_server:2026:*:*:*:*:*:*:*
Vendors & Products Nagios
Nagios log Server

Mon, 17 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 17 Nov 2025 18:00:00 +0000

Type Values Removed Values Added
Description Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to unsafe interaction between sudo rules and file system permissions. The web server account is granted passwordless sudo access to certain maintenance scripts while also being a member of a group that has write access to the directory containing those scripts. A local attacker running as the web server user can replace one of the permitted scripts with a malicious program and then execute it via sudo, resulting in arbitrary code execution with root privileges.
Title Nagios Log Server < 2026R1.0.1 Local Privilege Escalation via Writable Scripts and Sudo Rules
Weaknesses CWE-732
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-18T04:55:23.236Z

Reserved: 2025-04-15T19:15:22.585Z

Link: CVE-2025-34323

cve-icon Vulnrichment

Updated: 2025-11-17T18:23:51.837Z

cve-icon NVD

Status : Received

Published: 2025-11-17T18:15:56.880

Modified: 2025-11-17T18:15:56.880

Link: CVE-2025-34323

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.