5.1

CVE-2025-34135

Nagios XI < 2024R1.4.2 Overly Permissive Permissions on Systemd Unit Files

Nagios XI versions prior to 2024R1.4.2 configure some systemd unit files with permission sets that were too permissive. In particular, the nagios.service unit had executable permissions that were not required. Overly permissive permissions on service unit files can broaden local attack surface by enabling unintended execution behaviors or facilitating abuse of service operations when combined with other weaknesses.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NagiosNagios Xi Version < 2024
NagiosNagios Xi Version2024 Updater1
NagiosNagios Xi Version2024 Updater1.0.1
NagiosNagios Xi Version2024 Updater1.0.2
NagiosNagios Xi Version2024 Updater1.1
NagiosNagios Xi Version2024 Updater1.1.1
NagiosNagios Xi Version2024 Updater1.1.2
NagiosNagios Xi Version2024 Updater1.1.3
NagiosNagios Xi Version2024 Updater1.1.4
NagiosNagios Xi Version2024 Updater1.1.5
NagiosNagios Xi Version2024 Updater1.2
NagiosNagios Xi Version2024 Updater1.2.1
NagiosNagios Xi Version2024 Updater1.2.2
NagiosNagios Xi Version2024 Updater1.3
NagiosNagios Xi Version2024 Updater1.3.1
NagiosNagios Xi Version2024 Updater1.3.2
NagiosNagios Xi Version2024 Updater1.3.3
NagiosNagios Xi Version2024 Updater1.3.4
NagiosNagios Xi Version2024 Updater1.4
NagiosNagios Xi Version2024 Updater1.4.1
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.067
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.4 1.8 2.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
disclosure@vulncheck.com 5.1 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-732 Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.