5.1

CVE-2025-34135

Nagios XI versions prior to 2024R1.4.2 configure some systemd unit files with permission sets that were too permissive. In particular, the nagios.service unit had executable permissions that were not required. Overly permissive permissions on service unit files can broaden local attack surface by enabling unintended execution behaviors or facilitating abuse of service operations when combined with other weaknesses.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NagiosNagios Xi Version < 2024
NagiosNagios Xi Version2024 Updater1
NagiosNagios Xi Version2024 Updater1.0.1
NagiosNagios Xi Version2024 Updater1.0.2
NagiosNagios Xi Version2024 Updater1.1
NagiosNagios Xi Version2024 Updater1.1.1
NagiosNagios Xi Version2024 Updater1.1.2
NagiosNagios Xi Version2024 Updater1.1.3
NagiosNagios Xi Version2024 Updater1.1.4
NagiosNagios Xi Version2024 Updater1.1.5
NagiosNagios Xi Version2024 Updater1.2
NagiosNagios Xi Version2024 Updater1.2.1
NagiosNagios Xi Version2024 Updater1.2.2
NagiosNagios Xi Version2024 Updater1.3
NagiosNagios Xi Version2024 Updater1.3.1
NagiosNagios Xi Version2024 Updater1.3.2
NagiosNagios Xi Version2024 Updater1.3.3
NagiosNagios Xi Version2024 Updater1.3.4
NagiosNagios Xi Version2024 Updater1.4
NagiosNagios Xi Version2024 Updater1.4.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.061
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.4 1.8 2.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
disclosure@vulncheck.com 5.1 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-732 Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.