CVE-2021-37344

9.8 CRITICAL

📋 TL;DR

CVE-2021-37344 allows remote attackers to execute arbitrary operating system commands on Nagios XI servers through the Switch Wizard component. This affects Nagios XI installations with Switch Wizard versions before 2.5.7. Attackers can potentially gain full control of vulnerable systems.

💻 Affected Systems

Products:
  • Nagios XI Switch Wizard
Versions: All versions before 2.5.7
Operating Systems: Linux (all distributions where Nagios XI is installed)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Switch Wizard component to be installed and accessible. Nagios XI itself must be vulnerable version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to other systems, or deploy ransomware across the network.

🟠

Likely Case

Attackers gain shell access to the Nagios XI server, allowing them to modify monitoring configurations, disable alerts, and potentially access credentials stored on the system.

🟢

If Mitigated

With proper network segmentation and least privilege, impact is limited to the Nagios XI server itself, though this still represents significant risk to monitoring infrastructure.

🌐 Internet-Facing: HIGH - Nagios XI is often exposed for remote administration, and the vulnerability can be exploited without authentication.
🏢 Internal Only: HIGH - Even internally, this provides a foothold for lateral movement within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploits exist. The vulnerability is in the Switch Wizard's command parameter handling, allowing direct OS command injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Switch Wizard 2.5.7 or later

Vendor Advisory: https://www.nagios.com/downloads/nagios-xi/change-log/

Restart Required: Yes

Instructions:

1. Log into Nagios XI admin interface. 2. Navigate to Admin > Manage Components. 3. Update Switch Wizard to version 2.5.7 or later. 4. Restart Nagios XI services.

🔧 Temporary Workarounds

Disable Switch Wizard

linux

Remove or disable the vulnerable Switch Wizard component

rm -rf /usr/local/nagiosxi/html/includes/components/switchwizard/
systemctl restart nagios

Network Access Control

linux

Restrict access to Nagios XI web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately restrict network access to Nagios XI using firewall rules to only allow trusted administrative IPs
  • Implement web application firewall (WAF) rules to block command injection patterns targeting the Switch Wizard endpoint

🔍 How to Verify

Check if Vulnerable:

Check Switch Wizard version: cat /usr/local/nagiosxi/html/includes/components/switchwizard/version.inc.php | grep version

Check Version:

grep "\$version" /usr/local/nagiosxi/html/includes/components/switchwizard/version.inc.php

Verify Fix Applied:

Verify version is 2.5.7 or higher: grep "\$version" /usr/local/nagiosxi/html/includes/components/switchwizard/version.inc.php

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /nagiosxi/includes/components/switchwizard/
  • Commands with shell metacharacters in web logs
  • Unexpected process execution from nagios user

Network Indicators:

  • HTTP requests containing pipe characters, semicolons, or backticks in parameters
  • Outbound connections from Nagios server to unexpected destinations

SIEM Query:

source="web_logs" AND uri="*switchwizard*" AND (param="*|*" OR param="*;*" OR param="*`*")

🔗 References

📤 Share & Export