CVE-2025-67900
NXLog · NXLog Agent
A high-severity vulnerability has been discovered in NXLog Agent, a widely used log collection tool.
Executive summary
A high-severity vulnerability has been discovered in NXLog Agent, a widely used log collection tool. This flaw allows a remote, unauthenticated attacker to execute arbitrary code on systems running the affected software, potentially leading to a complete system compromise, data theft, and further network intrusion. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.
Vulnerability
A remote code execution (RCE) vulnerability exists within the network listener component of the NXLog Agent. The vulnerability is caused by a buffer overflow when processing specially crafted log messages. An unauthenticated attacker on the same network could send a malicious payload to the agent's listening port, triggering the overflow and allowing for the execution of arbitrary code with the privileges of the NXLog service account.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could lead to a complete compromise of the server or endpoint where the NXLog Agent is installed. Given that these agents are often deployed on critical systems and have access to sensitive log data, an attacker could exfiltrate confidential information, pivot to other systems within the network (lateral movement), or deploy ransomware. The potential for operational disruption and significant data breach presents a substantial risk to the organization.
Remediation
Immediate Action: Immediately upgrade all instances of NXLog Agent to version 6.0 or later, as recommended by the vendor. Prioritize patching for systems that are internet-facing or part of critical infrastructure.
Proactive Monitoring: Security teams should actively monitor network traffic to ports used by NXLog Agents for unusual patterns or malformed packets. Review NXLog application logs and system event logs on host machines for any signs of crashes, unexpected restarts of the agent service, or suspicious processes being spawned by the NXLog process.
Compensating Controls: If immediate patching is not feasible, implement network segmentation and firewall rules to restrict access to the NXLog Agent's listening ports. Only allow connections from trusted, explicitly defined IP addresses of log sources. Deploy network intrusion detection/prevention systems (IDS/IPS) with signatures capable of detecting exploit attempts against this vulnerability.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity (CVSS 8.1) of this remote code execution vulnerability, immediate action is required. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential for complete system compromise warrants urgent attention. We strongly recommend that all affected NXLog Agent installations be upgraded to a patched version immediately. If patching is delayed, compensating controls such as network access restrictions must be implemented as a temporary measure to mitigate risk.