Categories: Cyber Security News

Nagios XI Vulnerability Allows Unauthenticated Users to View Other User Details & Email

A significant security vulnerability (CVE-2024-54961) has been identified in Nagios XI 2024R1.2.2, enabling unauthenticated attackers to retrieve sensitive user information, including usernames and email addresses

This flaw, classified as an information disclosure vulnerability (CWE-200), exposes organizational user directories to potential misuse in phishing campaigns or credential-stuffing attacks.

Nagios XI Vulnerability

The vulnerability resides in improper access controls for multiple administrative endpoints. Unauthenticated requests to pages such as /nagiosxi/admin/userpreferences.php and /nagiosxi/includes/ajax/notification-handlers.inc.php return JSON payloads containing user metadata. 

Attackers can exploit this by crafting simple HTTP GET requests:

The server responds with structured data like:

This bypasses Nagios XI’s session validation mechanisms, which erroneously treat these endpoints as public resources. 

As of February 2025, no active exploits have been observed, but the simplicity of this attack vector necessitates urgent remediation.

Impact and Exploitation Scenarios

Compromised email addresses and usernames provide attackers with reconnaissance data to:

  • Launch targeted phishing campaigns leveraging Nagios-themed lures.
  • Brute-force credentials for privileged accounts (e.g., nagiosadmin).
  • Cross-reference data with password dumps for credential-stuffing attacks.

The vulnerability is particularly critical in multi-tenant deployments, where user lists may include external clients or third-party integrators

Mitigation and Response

Nagios Enterprises has addressed this flaw in subsequent releases. Administrators must:

  • Immediately upgrade to Nagios XI 2024R1.2.3 or later.
  • Audit user accounts for anomalous activity using grep ‘Failed login’ /usr/local/nagiosxi/var/auth.log.
  • Implement network-level controls to restrict access to /nagiosxi/admin/ paths from untrusted networks.

This incident follows a pattern of access control failures in Nagios XI, including past vulnerabilities like CVE-2021-25296 (RCE via WMI wizard) and CVE-2018-15708 (privilege escalation). 

The recurrence highlights the importance of rigorous endpoint testing in monitoring platforms that manage critical infrastructure credentials.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

The post Nagios XI Vulnerability Allows Unauthenticated Users to View Other User Details & Email  appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

IMS CARB DAY EXCLUSIVE: Kayla and AG Rokita discuss Secretary of State Race Shakeup

INDIANAPOLIS, IND. (WOWO) Indiana Attorney General Todd Rokita said Thursday that he withdrew his support…

1 minute ago

Three-judge panel to rule on NAACP challenge of redrawn Tennessee district map

Anthony Ashton, an attorney representing the NAACP Tennessee State Conference and other plaintiffs in a…

6 minutes ago

Stockard on the Stump: Tennessee, Nashville pour untold resources into Super Bowl LXIV

Former Gov. Bill Haslam and sportscaster Jim Nantz, a Nashville resident, touted the 2030 Super…

6 minutes ago

Sagging poll ratings, soaring gas prices put GOP in a fix for keeping US House control

Missouri Governor Mike Kehoe, left, talks with U.S. Vice President JD Vance after he arrived…

6 minutes ago

Web3 accelerator OnePieceLabs.xyz connects founders with networks, mentorship, and resources for building decentralized technology

OnePieceLabs.xyz – Squarespace customer – (United States) Organizations building at the frontier of decentralized technology…

2 hours ago

Smithfield Foods workers voice excitement for new Sioux Falls plant

May 21, 2026 Inside the century-old Smithfield Foods plant in downtown Sioux Falls, employees say…

2 hours ago

This website uses cookies.