Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 05 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nagios:fusion:2024:r1.2:*:*:*:*:*:* cpe:2.3:a:nagios:fusion:2024:r2.1:*:*:*:*:*:* |
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios fusion |
|
| Vendors & Products |
Nagios
Nagios fusion |
Mon, 27 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 CWE-307 |
|
| Metrics |
cvssV3_1
|
Mon, 27 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1.2 and v2024R2 allows attackers to bypass authentication via a bruteforce attack. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-27T15:48:28.679Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60424
Updated: 2025-10-27T15:47:44.259Z
Status : Analyzed
Published: 2025-10-27T16:15:41.753
Modified: 2025-11-05T21:00:24.500
Link: CVE-2025-60424
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:09:52Z