Nagios Log Server versions prior to 2024R2.0.2 contain a vulnerability in the cluster manager component when requesting sensitive credentials from peer nodes over an unencrypted channel even when SSL/TLS is enabled in the product configuration. As a result, an attacker positioned on the network path can intercept credentials in transit. Captured credentials could allow the attacker to authenticate as a cluster node or service account, enabling further unauthorized access, lateral movement, or system compromise.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Log_server | Nagios | * | 2024 (excluding) |
| Log_server | Nagios | 2024-r1 (including) | 2024-r1 (including) |
| Log_server | Nagios | 2024-r1.0.1 (including) | 2024-r1.0.1 (including) |
| Log_server | Nagios | 2024-r1.0.2 (including) | 2024-r1.0.2 (including) |
| Log_server | Nagios | 2024-r1.1 (including) | 2024-r1.1 (including) |
| Log_server | Nagios | 2024-r1.2 (including) | 2024-r1.2 (including) |
| Log_server | Nagios | 2024-r1.3 (including) | 2024-r1.3 (including) |
| Log_server | Nagios | 2024-r1.3.1 (including) | 2024-r1.3.1 (including) |
| Log_server | Nagios | 2024-r1.3.2 (including) | 2024-r1.3.2 (including) |
| Log_server | Nagios | 2024-r1.3.3 (including) | 2024-r1.3.3 (including) |
| Log_server | Nagios | 2024-r1.3.4 (including) | 2024-r1.3.4 (including) |
| Log_server | Nagios | 2024-r1.3.5 (including) | 2024-r1.3.5 (including) |
| Log_server | Nagios | 2024-r2 (including) | 2024-r2 (including) |
| Log_server | Nagios | 2024-r2.0.1 (including) | 2024-r2.0.1 (including) |