CVE-2024-13996
Published: 30 October 2025
Summary
CVE-2024-13996 is a critical-severity Insufficient Session Expiration (CWE-613) vulnerability in Nagios Nagios Xi. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and AC-10 (Concurrent Session Control).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-12 requires systems to terminate user sessions upon organization-defined conditions such as password changes, directly preventing pre-existing sessions from remaining valid after credential updates.
IA-5 mandates invalidation of authenticators under defined circumstances including password changes, which addresses associated session persistence by requiring management of authentication artifacts.
AC-10 enforces limits on concurrent sessions and terminates excess or all concurrent sessions under specified conditions, mitigating the impact of multiple active sessions post-password change.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables exploitation of public-facing web app (T1190) and facilitates browser session hijacking (T1185), web session cookie theft (T1539), and use of stolen web session cookies for continued unauthorized access (T1550.004) even after password changes.
NVD Description
Nagios XI versions prior to 2024R1.1.3 did not invalidate all other active sessions for a user when that user's password was changed. As a result, any pre-existing sessions (including those potentially controlled by an attacker) remained valid after a credential…
more
update. This insufficient session expiration could allow continued unauthorized access to user data and actions even after a password change.
Deeper analysisAI
CVE-2024-13996 is an insufficient session expiration vulnerability (CWE-613) in Nagios XI versions prior to 2024R1.1.3. When a user's password is changed, the software fails to invalidate all other active sessions associated with that user. This allows pre-existing sessions, including those potentially compromised by an attacker, to remain valid post-credential update, enabling continued unauthorized access.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network with low complexity, no required privileges or user interaction, and high impacts on confidentiality, integrity, and availability. An attacker with prior access to a valid user session—such as through session hijacking, theft, or fixation—can maintain access to sensitive user data and perform unauthorized actions even after the legitimate user changes their password.
Advisories recommend upgrading to Nagios XI 2024R1.1.3 or later to address the issue, as detailed in the Nagios changelog (https://www.nagios.com/changelog/nagios-xi/), security products page (https://www.nagios.com/products/security/#nagios-xi), and VulnCheck advisory (https://www.vulncheck.com/advisories/nagios-xi-session-not-invalidated-after-password-change).
Details
- CWE(s)