Metrics
Affected Vendors & Products
No reference.
Fri, 07 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-307 | |
| CPEs | cpe:2.3:a:nagios:fusion:2024:r1.0.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.3:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r2:*:*:*:*:*:* |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Fri, 07 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Nagios Fusion < 2024R2.1 2FA Brute Force Bypass | |
| Metrics |
ssvc
|
Fri, 07 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios Fusion versions prior to 2024R2.1 contain a brute-force bypass in the Two-Factor Authentication (2FA) implementation. The application did not properly enforce rate limiting or account lockout for repeated failed 2FA verification attempts, allowing a remote attacker to repeatedly try second-factor codes for a targeted account. By abusing the lack of enforcement, an attacker could eventually successfully authenticate to accounts protected by 2FA. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority as it is a duplicate of CVE-2025-60425. |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 06 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nagios:fusion:*:*:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.3:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r2:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Fri, 31 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios fusion |
|
| Vendors & Products |
Nagios
Nagios fusion |
Thu, 30 Oct 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios Fusion versions prior to 2024R2.1 contain a brute-force bypass in the Two-Factor Authentication (2FA) implementation. The application did not properly enforce rate limiting or account lockout for repeated failed 2FA verification attempts, allowing a remote attacker to repeatedly try second-factor codes for a targeted account. By abusing the lack of enforcement, an attacker could eventually successfully authenticate to accounts protected by 2FA. | |
| Title | Nagios Fusion < 2024R2.1 2FA Brute Force Bypass | |
| Weaknesses | CWE-307 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: REJECTED
Assigner: VulnCheck
Published: 2025-10-30T21:19:05.690Z
Updated: 2025-11-07T18:19:39.010Z
Reserved: 2025-04-15T19:15:22.577Z
Link: CVE-2025-34249
Updated:
Status : Rejected
Published: 2025-10-30T22:15:47.260
Modified: 2025-11-07T19:15:47.150
Link: CVE-2025-34249
No data.