CVE Vulnerabilities

CVE-2024-13996

Insufficient Session Expiration

Published: Oct 30, 2025 | Modified: Nov 06, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Nagios XI versions prior to 2024R1.1.3 did not invalidate all other active sessions for a user when that users password was changed. As a result, any pre-existing sessions (including those potentially controlled by an attacker) remained valid after a credential update. This insufficient session expiration could allow continued unauthorized access to user data and actions even after a password change.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Nagios_xi Nagios * 2024 (excluding)
Nagios_xi Nagios 2024-r1 (including) 2024-r1 (including)
Nagios_xi Nagios 2024-r1.0.1 (including) 2024-r1.0.1 (including)
Nagios_xi Nagios 2024-r1.0.2 (including) 2024-r1.0.2 (including)
Nagios_xi Nagios 2024-r1.1 (including) 2024-r1.1 (including)
Nagios_xi Nagios 2024-r1.1.1 (including) 2024-r1.1.1 (including)
Nagios_xi Nagios 2024-r1.1.2 (including) 2024-r1.1.2 (including)

Potential Mitigations

References