Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
No reference.
Fri, 07 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-307 | |
| CPEs | cpe:2.3:a:nagios:fusion:2024:r1.0.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.3:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r2:*:*:*:*:*:* |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Fri, 07 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Nagios Fusion < 2024R2.1 2FA Brute Force Bypass | |
| Metrics |
ssvc
|
Fri, 07 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios Fusion versions prior to 2024R2.1 contain a brute-force bypass in the Two-Factor Authentication (2FA) implementation. The application did not properly enforce rate limiting or account lockout for repeated failed 2FA verification attempts, allowing a remote attacker to repeatedly try second-factor codes for a targeted account. By abusing the lack of enforcement, an attacker could eventually successfully authenticate to accounts protected by 2FA. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority as it is a duplicate of CVE-2025-60425. |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 06 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nagios:fusion:*:*:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.0.3:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r1:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r2:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Fri, 31 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios fusion |
|
| Vendors & Products |
Nagios
Nagios fusion |
Thu, 30 Oct 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios Fusion versions prior to 2024R2.1 contain a brute-force bypass in the Two-Factor Authentication (2FA) implementation. The application did not properly enforce rate limiting or account lockout for repeated failed 2FA verification attempts, allowing a remote attacker to repeatedly try second-factor codes for a targeted account. By abusing the lack of enforcement, an attacker could eventually successfully authenticate to accounts protected by 2FA. | |
| Title | Nagios Fusion < 2024R2.1 2FA Brute Force Bypass | |
| Weaknesses | CWE-307 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: REJECTED
Assigner: VulnCheck
Published:
Updated: 2025-11-07T18:19:39.010Z
Reserved: 2025-04-15T19:15:22.577Z
Link: CVE-2025-34249
Updated:
Status : Rejected
Published: 2025-10-30T22:15:47.260
Modified: 2025-11-07T19:15:47.150
Link: CVE-2025-34249
No data.
OpenCVE Enrichment
Updated: 2025-10-31T10:13:55Z
No weakness.