Nagios XI versions prior to 2024R1.2 are vulnerable to remote code execution (RCE) through its NRDP (Nagios Remote Data Processor) server plugins. Insufficient validation of inbound NRDP request parameters allows crafted input to reach command execution paths, enabling attackers to execute arbitrary commands on the underlying host in the context of the web/Nagios service.
History

Thu, 06 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Nagios nagios Xi
CPEs cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.0.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.0.2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.2:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.3:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.4:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1.5:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1.1:*:*:*:*:*:*
cpe:2.3:a:nagios:nagios_xi:2024:r1:*:*:*:*:*:*
Vendors & Products Nagios nagios Xi
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 31 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Nagios
Nagios xi
Vendors & Products Nagios
Nagios xi

Thu, 30 Oct 2025 21:45:00 +0000

Type Values Removed Values Added
Description Nagios XI versions prior to 2024R1.2 are vulnerable to remote code execution (RCE) through its NRDP (Nagios Remote Data Processor) server plugins. Insufficient validation of inbound NRDP request parameters allows crafted input to reach command execution paths, enabling attackers to execute arbitrary commands on the underlying host in the context of the web/Nagios service.
Title Nagios XI < 2024R1.2 RCE via NRDP Server Plugins
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-30T21:42:19.225Z

Updated: 2025-10-31T13:24:16.576Z

Reserved: 2025-10-22T18:36:16.828Z

Link: CVE-2024-14003

cve-icon Vulnrichment

Updated: 2025-10-31T13:05:41.989Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-30T22:15:45.737

Modified: 2025-11-06T16:09:37.150

Link: CVE-2024-14003

cve-icon Redhat

No data.