Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to a combination of sudo misconfiguration and group-writable application directories. The 'www-data' user is a member of the 'nagios' group, which has write access to '/usr/local/nagioslogserver/scripts', while several scripts in this directory are owned by root and may be executed via sudo without a password. A local attacker running as 'www-data' can move one of these root-owned scripts to a backup name and create a replacement script with attacker-controlled content at the original path, then invoke it with sudo. This allows arbitrary commands to be executed with root privileges, providing full compromise of the underlying operating system.
References
Configurations
Configuration 1 (hide)
|
History
26 Nov 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
24 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Nagios Log Server versions prior to 2026R1.0.1 are vulnerable to local privilege escalation due to a combination of sudo misconfiguration and group-writable application directories. The 'www-data' user is a member of the 'nagios' group, which has write access to '/usr/local/nagioslogserver/scripts', while several scripts in this directory are owned by root and may be executed via sudo without a password. A local attacker running as 'www-data' can move one of these root-owned scripts to a backup name and create a replacement script with attacker-controlled content at the original path, then invoke it with sudo. This allows arbitrary commands to be executed with root privileges, providing full compromise of the underlying operating system. |
20 Nov 2025, 21:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:nagios:log_server:*:*:*:*:*:*:*:* cpe:2.3:a:nagios:log_server:2026:r1:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://www.nagios.com/changelog/nagios-log-server/nagios-log-server-2026r1-0-1/ - Release Notes | |
| References | () https://www.nagios.com/products/security/#log-server - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/nagios-log-server-local-privilege-escalation-via-writable-scripts-and-sudo-rules - Third Party Advisory | |
| First Time |
Nagios log Server
Nagios |
17 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-17 18:15
Updated : 2025-11-26 15:15
NVD link : CVE-2025-34323
Mitre link : CVE-2025-34323
CVE.ORG link : CVE-2025-34323
JSON object : View
Products Affected
nagios
- log_server
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
