CVE-2020-28901
NixOS vulnerability analysis and mitigation

Overview

Command Injection in Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation or Code Execution as root via vectors related to corrupt component installation in cmd_subsys.php. The vulnerability was discovered and reported to Nagios in October 2020 and was remediated in November 2020 (Skylight Blog).

Technical details

The vulnerability exists in the cmd_subsys.php script where improper input validation allows for command injection. The vulnerability has a CVSS v3.1 Base Score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and CVSS v2.0 Base Score of 10.0 HIGH (Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C). The issue is classified as CWE-77: Improper Neutralization of Special Elements used in a Command (NVD).

Impact

The vulnerability allows attackers to escalate privileges from apache to nagios via command injection on the componentdir parameter in cmdsubsys.php. In a telco setting, where a telco is monitoring thousands of sites, if a customer site is fully compromised, an attacker can use the vulnerability to compromise the telco, and then every other monitored customer site (Hacker News).

Mitigation and workarounds

The vulnerability was patched in November 2020. Organizations should upgrade their Nagios Fusion installations to versions newer than 4.1.8 to protect against this vulnerability (Nagios Changelog).

Community reactions

Security researchers emphasized that the effort required to find and exploit these vulnerabilities is negligible for sophisticated attackers, particularly nation-states. The discovery highlighted concerns about the security of third-party technology hubs and the implicit trust given to their tools when deployed on critical assets (Skylight Blog).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox_esr
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox-esr
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • thunderbird
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management