A session management flaw in Nagios Network Analyzer 2024R1.0.3 allows an attacker to reuse session tokens even after a user logs out, leading to unauthorized access and account takeover. This occurs due to insufficient session expiration, where session tokens remain valid beyond logout, allowing an attacker to impersonate users and perform actions on their behalf.
References
Link | Resource |
---|---|
https://github.com/harshal79/Insufficient-Session-Expiration.git | Third Party Advisory |
https://www.nagios.com/changelog/#network-analyzer | Release Notes |
Configurations
History
18 Jun 2025, 13:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Nagios nagios Network Analyzer
Nagios |
|
CPE | cpe:2.3:a:nagios:nagios_network_analyzer:2024:r1.0.3*:*:*:*:*:*:* | |
References | () https://github.com/harshal79/Insufficient-Session-Expiration.git - Third Party Advisory | |
References | () https://www.nagios.com/changelog/#network-analyzer - Release Notes |
01 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
CWE | CWE-613 |
01 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-01 17:15
Updated : 2025-06-18 13:59
NVD link : CVE-2025-28132
Mitre link : CVE-2025-28132
CVE.ORG link : CVE-2025-28132
JSON object : View
Products Affected
nagios
- nagios_network_analyzer
CWE
CWE-613
Insufficient Session Expiration