CVE-2025-60424

7.6 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass two-factor authentication in Nagios Fusion by brute-forcing OTP codes due to insufficient rate limiting. Attackers can gain unauthorized access to administrative interfaces. Organizations running affected Nagios Fusion versions are at risk.

💻 Affected Systems

Products:
  • Nagios Fusion
Versions: v2024R1.2 and v2024R2
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration. The OTP verification component lacks rate limiting by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain administrative access, modify monitoring configurations, disable alerts, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to Nagios Fusion interface leading to monitoring data exposure, alert manipulation, and potential privilege escalation within the monitoring infrastructure.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible if systems are exposed.

🌐 Internet-Facing: HIGH - Internet-facing Nagios Fusion instances are directly exploitable without authentication requirements for the OTP endpoint.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to gain unauthorized access to monitoring systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code is available on GitHub. Exploitation requires only network access to the OTP verification endpoint and basic scripting capabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Nagios Fusion changelog for latest version

Vendor Advisory: https://www.nagios.com/changelog/#fusion

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download latest Nagios Fusion version from official Nagios website. 3. Follow Nagios Fusion upgrade documentation. 4. Restart Nagios Fusion services. 5. Verify OTP rate limiting is enabled.

🔧 Temporary Workarounds

Implement Web Application Firewall Rules

linux

Configure WAF to rate limit requests to OTP verification endpoints

# Example for mod_security: SecRule REQUEST_URI "@contains /otp-verify" "phase:1,id:1001,block,msg:'OTP brute force attempt',chain"
SecRule &REQUEST_HEADERS:User-Agent "@gt 10" "t:none,setvar:ip.otp_counter=+1,expirevar:ip.otp_counter=60"

Network Access Control

linux

Restrict access to Nagios Fusion OTP endpoints to trusted IP ranges only

# Example iptables rule: iptables -A INPUT -p tcp --dport 80 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement network segmentation to isolate Nagios Fusion from untrusted networks
  • Enable detailed logging for OTP verification attempts and monitor for brute force patterns

🔍 How to Verify

Check if Vulnerable:

Test if OTP endpoint accepts unlimited requests by sending multiple OTP attempts and observing if rate limiting triggers

Check Version:

grep 'version' /usr/local/nagiosfusion/html/includes/config.inc.php 2>/dev/null || cat /usr/local/nagiosfusion/version.txt

Verify Fix Applied:

After patching, attempt multiple failed OTP verifications and verify that requests are blocked or delayed after threshold

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed OTP verification attempts from single IP
  • Unusual OTP success patterns
  • Rapid sequential requests to OTP endpoints

Network Indicators:

  • High volume of requests to /otp-verify endpoints
  • Patterned OTP code submission attempts

SIEM Query:

source="nagios_fusion.log" AND (uri_path="/otp-verify" OR uri_path="/api/otp") | stats count by src_ip | where count > 10

🔗 References

📤 Share & Export