CVE-2025-34078
HIGHNSClient++ <0.5.2.35 - Privilege Escalation
Title source: llmDescription
A local privilege escalation vulnerability exists in NSClient++ 0.5.2.35 when both the web interface and ExternalScripts features are enabled. The configuration file (nsclient.ini) stores the administrative password in plaintext and is readable by local users. By extracting this password, an attacker can authenticate to the NSClient++ web interface (typically accessible on port 8443) and abuse the ExternalScripts plugin to inject and execute arbitrary commands as SYSTEM by registering a custom script, saving the configuration, and triggering it via the API. This behavior is documented but insecure, as the plaintext credential exposure undermines access isolation between local users and administrative functions.
Exploits (3)
metasploit
WORKING POC
EXCELLENT
by kindredsec, BZYO · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/nscp_pe.rb
References (4)
Scores
CVSS v3
7.8
EPSS
0.0229
EPSS Percentile
84.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-522
Status
published
Affected Products (1)
nsclient/nsclient\+\+
Timeline
Published
Jul 02, 2025
Tracked Since
Feb 18, 2026