A session management flaw in Nagios Network Analyzer 2024R1.0.3 allows an attacker to reuse session tokens even after a user logs out, leading to unauthorized access and account takeover. This occurs due to insufficient session expiration, where session tokens remain valid beyond logout, allowing an attacker to impersonate users and perform actions on their behalf.
History

Tue, 01 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-613
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 16:45:00 +0000

Type Values Removed Values Added
Description A session management flaw in Nagios Network Analyzer 2024R1.0.3 allows an attacker to reuse session tokens even after a user logs out, leading to unauthorized access and account takeover. This occurs due to insufficient session expiration, where session tokens remain valid beyond logout, allowing an attacker to impersonate users and perform actions on their behalf.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-04-01T00:00:00.000Z

Updated: 2025-04-01T19:49:32.374Z

Reserved: 2025-03-11T00:00:00.000Z

Link: CVE-2025-28132

cve-icon Vulnrichment

Updated: 2025-04-01T19:49:18.459Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-01T17:15:46.700

Modified: 2025-04-01T20:26:01.990

Link: CVE-2025-28132

cve-icon Redhat

No data.