A session management flaw in Nagios Network Analyzer 2024R1.0.3 allows an attacker to reuse session tokens even after a user logs out, leading to unauthorized access and account takeover. This occurs due to insufficient session expiration, where session tokens remain valid beyond logout, allowing an attacker to impersonate users and perform actions on their behalf.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/harshal79/Insufficient-Session-Expiration.git | Third Party Advisory |
https://www.nagios.com/changelog/#network-analyzer | Release Notes |
Configurations
History
18 Jun 2025, 13:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/harshal79/Insufficient-Session-Expiration.git - Third Party Advisory | |
References | () https://www.nagios.com/changelog/#network-analyzer - Release Notes | |
First Time |
Nagios
Nagios nagios Network Analyzer |
|
CPE | cpe:2.3:a:nagios:nagios_network_analyzer:2024:r1.0.3*:*:*:*:*:*:* |
01 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-01 17:15
Updated : 2025-06-18 13:59
NVD link : CVE-2025-28132
Mitre link : CVE-2025-28132
JSON object : View
Products Affected
nagios
- nagios_network_analyzer
CWE
No CWE.