Nagios Log Server versions prior to 2024R2.0.2 contain a vulnerability in the cluster manager component when requesting sensitive credentials from peer nodes over an unencrypted channel even when SSL/TLS is enabled in the product configuration. As a result, an attacker positioned on the network path can intercept credentials in transit. Captured credentials could allow the attacker to authenticate as a cluster node or service account, enabling further unauthorized access, lateral movement, or system compromise.
References
| Link | Resource |
|---|---|
| https://www.nagios.com/changelog/#log-server | Release Notes |
| https://www.nagios.com/products/security/#log-server-2024R2 | Vendor Advisory |
| https://www.vulncheck.com/advisories/nagios-log-server-cluster-manager-credential-requests-sent-over-plaintext | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Nov 2025, 16:29
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-30 22:15
Updated : 2025-11-06 16:29
NVD link : CVE-2025-34271
Mitre link : CVE-2025-34271
CVE.ORG link : CVE-2025-34271
JSON object : View
Products Affected
nagios
- log_server
CWE
CWE-319
Cleartext Transmission of Sensitive Information
