Home

Description

Nagios XI versions prior to 2024R1.1.3 did not invalidate all other active sessions for a user when that user's password was changed. As a result, any pre-existing sessions (including those potentially controlled by an attacker) remained valid after a credential update. This insufficient session expiration could allow continued unauthorized access to user data and actions even after a password change.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-30 | Updated 2025-10-31 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-613 Insufficient Session Expiration

Product status

Default status
unaffected

Any version before 2024R1.1.3
unknown

Credits

Jack Eli finder

References

www.nagios.com/products/security/ vendor-advisory patch

www.nagios.com/changelog/nagios-xi/ release-notes patch

www.vulncheck.com/...n-not-invalidated-after-password-change third-party-advisory

cve.org (CVE-2024-13996)

nvd.nist.gov (CVE-2024-13996)

Download JSON