Cyber Posture

CVE-2025-34274

CriticalPublic PoC

Published: 30 October 2025

Published
30 October 2025
Modified
06 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0082 74.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-34274 is an execution with unnecessary privileges vulnerability (CWE-250) affecting Nagios Log Server versions prior to 2024R2.0.3. The issue stems from the software's embedded Logstash process running as the root user, which elevates the potential impact of any compromise in this network-facing component. The vulnerability has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its critical severity due to high confidentiality, integrity, and availability impacts.

A remote, unauthenticated attacker can exploit this vulnerability by first compromising the Logstash process, such as through an insecure plugin, pipeline configuration injection, or a flaw in input parsing. Once compromised, the attacker gains the ability to execute arbitrary code with root privileges, leading to full system compromise on the affected Nagios Log Server host.

Nagios advisories indicate that the vulnerability is addressed in version 2024R2.0.3 by modifying the Logstash service to run as the lower-privileged 'nagios' user rather than root, thereby reducing the risk for this service that processes untrusted input or third-party components. Additional details are available in the Nagios Log Server changelog at https://www.nagios.com/changelog/#log-server, the security advisories page at https://www.nagios.com/products/security/#log-server-2024R2, and the VulnCheck advisory at https://www.vulncheck.com/advisories/nagios-log-server-logstash-process-root-privileges. Security practitioners should upgrade to the patched version and review Logstash configurations for potential entry points.

Details

CWE(s)
CWE-250

Affected Products

nagios
log server
2024 · ≤ 2024

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability involves a network-facing Logstash process running as root, enabling remote unauthenticated attackers to exploit public-facing applications (T1190) for arbitrary code execution with root privileges, directly facilitating exploitation for privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References