Researchers from industrial cybersecurity firm Claroty have discovered eleven vulnerabilities in widely used network management products from Nagios. Nagios XI provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. It is used by thousands of organizations worldwide. The vulnerabilities could lead to server-side request forgery (SSRF), spoofing, local privilege escalation, remote code execution and information disclosure.
“Claroty Team82’s latest research focuses on network management systems, starting with Nagios, one of the most popular in the world used by thousands of organizations.” reads the advisory published by the company. “Team82 privately disclosed 11 vulnerabilities in key Nagios components, all of which were fixed in updates released in August.”
The vulnerabilities impact Nagios XI, XI Switch Wizard, XI Docker Wizard, and XI WatchGuard. Below is the complete list of flaws discovered by the experts:
The vendor released patches for each of the impacted products in August.
The researchers created a proof-of-concept (PoC) exploit that shows how an authenticated attacker could chain some of the vulnerabilities to establish a reverse shell (remote bash shell) from our Nagios XI server with root privileges.
The experts pointed out that network management systems are privileged targets because compromising them it is possible to have access to every critical network component.
“While this feature might be useful for NOC purposes, allowing users to easily connect to the platform and view information without the need for credentials also allows attackers to gain access to a user account in the platform, thus rendering any post-auth vulnerability exploitable without authentication.” concludes Claroty.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, network monitoring)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.