An access control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows deleted users to retain access to system resources due to improper session invalidation and stale token handling. When an administrator deletes a user account, the backend fails to terminate active sessions and revoke associated API tokens, enabling unauthorized access to restricted functions.
History

Tue, 22 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-613
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Apr 2025 17:00:00 +0000

Type Values Removed Values Added
Description An access control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows deleted users to retain access to system resources due to improper session invalidation and stale token handling. When an administrator deletes a user account, the backend fails to terminate active sessions and revoke associated API tokens, enabling unauthorized access to restricted functions.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-04-18T00:00:00.000Z

Updated: 2025-04-22T14:28:48.195Z

Reserved: 2025-03-11T00:00:00.000Z

Link: CVE-2025-28059

cve-icon Vulnrichment

Updated: 2025-04-22T14:28:42.700Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-18T17:15:34.700

Modified: 2025-04-22T15:16:10.627

Link: CVE-2025-28059

cve-icon Redhat

No data.