CVE-2021-37346

9.8 CRITICAL

📋 TL;DR

CVE-2021-37346 allows remote attackers to execute arbitrary operating system commands on Nagios XI servers through the WatchGuard Wizard component. This affects Nagios XI installations using WatchGuard Wizard versions before 1.4.8. Attackers can gain full control of vulnerable systems.

💻 Affected Systems

Products:
  • Nagios XI WatchGuard Wizard
Versions: All versions before 1.4.8
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WatchGuard Wizard component to be installed and accessible. Nagios XI itself must be vulnerable version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Attackers gain shell access to the Nagios XI server, allowing them to steal monitoring data, modify configurations, and use the server as a pivot point to attack other systems.

🟢

If Mitigated

With proper network segmentation and least privilege, impact is limited to the Nagios XI server itself, though sensitive monitoring data could still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WatchGuard Wizard 1.4.8 or later

Vendor Advisory: https://www.nagios.com/downloads/nagios-xi/change-log/

Restart Required: Yes

Instructions:

1. Log into Nagios XI admin interface. 2. Navigate to Admin > Manage Components. 3. Update WatchGuard Wizard to version 1.4.8 or later. 4. Restart Nagios XI services.

🔧 Temporary Workarounds

Disable WatchGuard Wizard

linux

Remove or disable the vulnerable WatchGuard Wizard component if not required.

rm -rf /usr/local/nagiosxi/html/includes/components/watchguard/

Network Access Control

linux

Restrict network access to Nagios XI web interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately isolate the Nagios XI server from the internet and restrict internal access to authorized users only.
  • Implement strict network monitoring and alerting for any suspicious commands or processes originating from the Nagios XI server.

🔍 How to Verify

Check if Vulnerable:

Check WatchGuard Wizard version: cat /usr/local/nagiosxi/html/includes/components/watchguard/version.inc 2>/dev/null | grep version

Check Version:

grep 'version' /usr/local/nagiosxi/html/includes/components/watchguard/version.inc

Verify Fix Applied:

Verify version is 1.4.8 or higher: grep 'version' /usr/local/nagiosxi/html/includes/components/watchguard/version.inc

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in Nagios logs
  • Suspicious POST requests to WatchGuard Wizard endpoints
  • Unexpected processes spawned by Nagios user

Network Indicators:

  • HTTP requests containing shell metacharacters to Nagios XI
  • Outbound connections from Nagios server to unexpected destinations

SIEM Query:

source="nagios.log" AND ("watchguard" OR "os command" OR "shell")

🔗 References

📤 Share & Export