6.9
CVE-2025-34270
- EPSS 0.09%
- Veröffentlicht 30.10.2025 21:22:28
- Zuletzt bearbeitet 06.11.2025 16:31:27
- Quelle disclosure@vulncheck.com
- CVE-Watchlists
- Unerledigt
Nagios Log Server versions prior to 2024R2.0.2 contain a vulnerability in the AD/LDAP user import functionality as it fails to obfuscate the password field during import. As a result, the plaintext password supplied for imported accounts may be exposed in the user interface, logs, or other diagnostic output. This can leak sensitive credentials to administrators or anyone with access to import results.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nagios ≫ Log Server Version < 2024
Nagios ≫ Log Server Version2024 Updater1
Nagios ≫ Log Server Version2024 Updater1.0.1
Nagios ≫ Log Server Version2024 Updater1.0.2
Nagios ≫ Log Server Version2024 Updater1.1
Nagios ≫ Log Server Version2024 Updater1.2
Nagios ≫ Log Server Version2024 Updater1.3
Nagios ≫ Log Server Version2024 Updater1.3.1
Nagios ≫ Log Server Version2024 Updater1.3.2
Nagios ≫ Log Server Version2024 Updater1.3.3
Nagios ≫ Log Server Version2024 Updater1.3.4
Nagios ≫ Log Server Version2024 Updater1.3.5
Nagios ≫ Log Server Version2024 Updater2
Nagios ≫ Log Server Version2024 Updater2.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.249 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
| disclosure@vulncheck.com | 6.9 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-312 Cleartext Storage of Sensitive Information
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.