2025-10-30 21:43CVE-2024-14008VulnCheck
PUBLISHED5.2CWE-78

Nagios XI < 2024R1.3.2 RCE via WinRM Configuration Wizard

Nagios XI versions prior to 2024R1.3.2 contain a remote command execution vulnerability in the WinRM Configuration Wizard. Insufficient validation of user-supplied input allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user.

Problem type

Affected products

Nagios

XI

< 2024R1.3.2 - UNKNOWN

References

JSON source

Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2024-14008",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2025-10-31T13:24:00.739Z",
    "dateReserved": "2025-10-22T19:14:53.241Z",
    "datePublished": "2025-10-30T21:43:07.355Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2025-10-30T21:43:07.355Z"
      },
      "title": "Nagios XI < 2024R1.3.2 RCE via WinRM Configuration Wizard",
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios XI versions prior to 2024R1.3.2 contain a remote command execution vulnerability in the WinRM Configuration Wizard. Insufficient validation of user-supplied input allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Nagios XI versions prior to 2024R1.3.2&nbsp;contain a remote command execution vulnerability in the WinRM Configuration Wizard. Insufficient validation of user-supplied input allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user.<br>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Nagios",
          "product": "XI",
          "modules": [
            "WinRM Configuration Wizard"
          ],
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "unknown",
              "versionType": "custom",
              "lessThan": "2024R1.3.2"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
              "cweId": "CWE-78",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.nagios.com/products/security/#nagios-xi",
          "tags": [
            "vendor-advisory",
            "patch"
          ]
        },
        {
          "url": "https://www.nagios.com/changelog/nagios-xi/",
          "tags": [
            "release-notes",
            "patch"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/nagios-xi-rce-via-winrm-configuration-wizard",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "Remove WinRM configuration wizard.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Remove WinRM configuration wizard.<br>"
            }
          ]
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Nagios addresses this vulnerability as \"Nagios XI was vulnerable to remote command execution through the WinRM configuration wizard\" and as a part of \"Fixed RCE in WinRM Wizard.\"",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<span style=\"background-color: rgb(255, 255, 255);\">Nagios addresses this vulnerability as \"</span><span style=\"background-color: rgb(255, 255, 255);\">Nagios XI was vulnerable to remote command execution through the WinRM configuration wizard\" and as a part of \"Fixed RCE in WinRM Wizard.\"</span><br>"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Leo Trinh",
          "type": "finder"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2025-10-31T13:24:00.739Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}

Mitre source

https://cveawg.mitre.org/api/cve/CVE-2024-14008