TL;DR

Nagios Host affected by CVE-2026-2043 allows remote attackers to inject commands and execute arbitrary code with valid credentials.

What happened

["Remote attacker can inject commands via the 'esensors_websensor_configwizard_func' command in Nagios Host.", 'Exploit requires user authentication.']

Why it matters for ops

['Vulnerability exists due to insufficient input validation for the affected function.', 'Allows unauthorized execution of system commands with privileges granted by valid credentials.']

Mitigation

  • Apply vendor-provided patches or updates immediately.
  • Restrict permissions for user accounts with access to the vulnerable function.

Action items

  • Check for and apply available security updates for Nagios Host.
  • Review system configurations and tighten authentication requirements for critical functions.

Detection IOCs

  • Unusual network activity from Nagios Host
  • Unexpected command injections in logs

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-072/