Home

Description

Nagios Log Server versions prior to 2024R2.0.2 contain a vulnerability in the AD/LDAP user import functionality as it fails to obfuscate the password field during import. As a result, the plaintext password supplied for imported accounts may be exposed in the user interface, logs, or other diagnostic output. This can leak sensitive credentials to administrators or anyone with access to import results.

PUBLISHED Reserved 2025-04-15 | Published 2025-10-30 | Updated 2025-10-31 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-312 Cleartext Storage of Sensitive Information

CWE-522 Insufficiently Protected Credentials

Product status

Default status
unaffected

Any version before 2024R2.0.2
affected

References

www.nagios.com/products/security/ vendor-advisory patch

www.nagios.com/changelog/ release-notes patch

support.nagios.com/...orting-users-with-ad-and-ldap-995.html product

www.vulncheck.com/...-ad-ldap-import-password-not-obfuscated third-party-advisory

cve.org (CVE-2025-34270)

nvd.nist.gov (CVE-2025-34270)

Download JSON