CVE-2024-14003

9.8 CRITICAL
Published: October 30, 2025 Modified: November 06, 2025

Description

Nagios XI versions prior to 2024R1.2 are vulnerable to remote code execution (RCE) through its NRDP (Nagios Remote Data Processor) server plugins. Insufficient validation of inbound NRDP request parameters allows crafted input to reach command execution paths, enabling attackers to execute arbitrary commands on the underlying host in the context of the web/Nagios service.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://www.nagios.com/changelog/nagios-xi/
Source: disclosure@vulncheck.com
Release Notes
https://www.nagios.com/products/security/#nagios-xi
Source: disclosure@vulncheck.com
Vendor Advisory
https://www.vulncheck.com/advisories/nagios-xi-rce-via-nrdp-server-plugins
Source: disclosure@vulncheck.com
Third Party Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.9%
74th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

nagios