Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-10035
Analyzed
More InfoOfficial Page
Source-disclosure@vulncheck.com
View Known Exploited Vulnerability (KEV) details
Published At-30 Oct, 2025 | 22:15
Updated At-06 Nov, 2025 | 14:13

Nagios XI versions prior to 2011R1.9 contain privilege escalation vulnerabilities in the scripts that install or update system crontab entries. Due to time-of-check/time-of-use race conditions and missing synchronization or final-path validation, a local low-privileged user could manipulate filesystem state during crontab installation to influence the files or commands executed with elevated privileges, resulting in execution with higher privileges.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.3HIGH
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Nagios Enterprises, LLC
nagios
>>nagios_xi>>Versions up to 2009(inclusive)
cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.1:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.2:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.3:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.4:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.5:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.6:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.7:*:*:*:*:*:*
Nagios Enterprises, LLC
nagios
>>nagios_xi>>2011
cpe:2.3:a:nagios:nagios_xi:2011:r1.8:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-367Secondarydisclosure@vulncheck.com
CWE ID: CWE-367
Type: Secondary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.nagios.com/changelog/nagios-xi/disclosure@vulncheck.com
Release Notes
https://www.vulncheck.com/advisories/nagios-xi-race-conditions-in-crontab-install-script-lpedisclosure@vulncheck.com
Third Party Advisory
Hyperlink: https://www.nagios.com/changelog/nagios-xi/
Source: disclosure@vulncheck.com
Resource:
Release Notes
Hyperlink: https://www.vulncheck.com/advisories/nagios-xi-race-conditions-in-crontab-install-script-lpe
Source: disclosure@vulncheck.com
Resource:
Third Party Advisory
Change History
0Changes found

Details not found