Broken Access Control in Nagios NA 2024R1.0.3 Allows Read-Only to Delete Services
CVE-2025-28131 Published on April 1, 2025

A Broken Access Control vulnerability in Nagios Network Analyzer 2024R1.0.3 allows low-privilege users with "Read-Only" access to perform administrative actions, including stopping system services and deleting critical resources. This flaw arises due to improper authorization enforcement, enabling unauthorized modifications that compromise system integrity and availability.

NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

What is an AuthZ Vulnerability?

The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

CVE-2025-28131 has been classified to as an AuthZ vulnerability or weakness.


Products Associated with CVE-2025-28131

stack.watch emails you whenever new vulnerabilities are published in Nagios Network Analyzer or Nagios Network Analyzer. Just hit a watch button to start following.

 
 

Exploit Probability

EPSS
0.14%
Percentile
34.01%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.