Cyber Posture

CVE-2024-13996

CriticalPublic PoC

Published: 30 October 2025

Published
30 October 2025
Modified
06 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0020 41.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries can use stolen session cookies to authenticate to web applications and services.

Security Summary

CVE-2024-13996 is an insufficient session expiration vulnerability (CWE-613) in Nagios XI versions prior to 2024R1.1.3. When a user's password is changed, the software fails to invalidate all other active sessions associated with that user. This allows pre-existing sessions, including those potentially compromised by an attacker, to remain valid post-credential update, enabling continued unauthorized access.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network with low complexity, no required privileges or user interaction, and high impacts on confidentiality, integrity, and availability. An attacker with prior access to a valid user session—such as through session hijacking, theft, or fixation—can maintain access to sensitive user data and perform unauthorized actions even after the legitimate user changes their password.

Advisories recommend upgrading to Nagios XI 2024R1.1.3 or later to address the issue, as detailed in the Nagios changelog (https://www.nagios.com/changelog/nagios-xi/), security products page (https://www.nagios.com/products/security/#nagios-xi), and VulnCheck advisory (https://www.vulncheck.com/advisories/nagios-xi-session-not-invalidated-after-password-change).

Details

CWE(s)
CWE-613

Affected Products

nagios
nagios xi
2024 · ≤ 2024

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

Vulnerability enables exploitation of public-facing web app (T1190) and facilitates browser session hijacking (T1185), web session cookie theft (T1539), and use of stolen web session cookies for continued unauthorized access (T1550.004) even after password changes.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References