CVE # Advisory name Product(s) Severity Last Updated
NETSCOUT-SA-PFOS-6.8.1-OPENSSL OpenSSL Update PFOS N/A

OpenSSL Update

NETSCOUT-SA-PFOS-6.8.1-OPENSSL

Related Product(s): PFOS

First Published: 

Overview

NETSCOUT has updated the OpenSSL component in PFOS version 6.8.1. This update upgrades from version 3.5.4 to 3.5.5, incorporating upstream fixes, performance improvements, and security hardening.

Component Details 

  • Component: OpenSSL
  • Previous Version: 3.5.4
  • Updated Version: 3.5.4

Revision History

  • Version: 6.8.1
  • Date: 2026 May 15
  • Description: Initial Public Release
NETSCOUT-SA-PFOS-6.8.1-OPENSSH OpenSSH Update PFOS N/A

OpenSSH Update

NETSCOUT-SA-PFOS-6.8.1-OPENSSH

Related Product(s): PFOS

First Published: 

Overview

NETSCOUT has updated the OpenSSH component in PFOS version 6.8.1. This update includes an upgrade from version 10.1p1 to 10.2p1, incorporating upstream fixes, performance improvements, and security hardening.

Component Details 

  • Component: OpenSSH
  • Previous Version: 10.1p1
  • Updated Version: 10.2p1

Revision History

  • Version: 6.8.1
  • Date: 2026 May 15
  • Description: Initial Public Release
NETSCOUT-SA-PFOS-6.8.1-NGINX NGINX Update PFOS N/A

NGINX Update

NETSCOUT-SA-PFOS-6.8.1-NGINX

Related Product(s): PFOS

First Published: 

Overview

NETSCOUT has updated the NGINX component in PFOS version 6.8.1. This update upgrades from version 1.28.0 to 1.28.2, incorporating upstream fixes, performance improvements, and security hardening.

Component Details 

  • Component: NGINX
  • Previous Version: 1.28.0
  • Updated Version: 1.28.2

Revision History

  • Version: 6.8.1
  • Date: 2026 May 15
  • Description: Initial Public Release
CVE-2025-32986 File Access Vulnerability nGeniusONE High

File Access Vulnerability

CVE-2025-32986

Related Product(s): nGeniusONE

First Published: 

Summary
NETSCOUT nGeniusONE before 6.4.0 b2350 has a Sensitive File Accessible Without Proper Authentication to an endpoint. 

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software
Customers should install build 6.4.0 b2350 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.
techsupport@netscout.com

CVE-2025-32985 Hardcoded Credentials nGeniusONE Critical

Hardcoded Credentials

CVE-2025-32985

Related Product(s): nGeniusONE

First Published: 

Summary
NETSCOUT nGeniusONE before 6.4.0 b2350 has Hardcoded Credentials that can be obtained from JAR files. 

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software
Customers should install build 6.4.0 b2350 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.
techsupport@netscout.com

CVE-2025-32984 Stored Cross-Site Scripting nGeniusONE Medium

Stored Cross-Site Scripting

CVE-2025-32984

Related Product(s): nGeniusONE

First Published: 

Summary
NETSCOUT nGeniusONE before 6.4.0 b2350 allows Stored Cross-Site Scripting (XSS) via a certain POST parameter. 

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software
Customers should install build 6.4.0 b2350 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.
techsupport@netscout.com

CVE-2025-32983 Stack Trace Error nGeniusONE High

Stack Trace Error

CVE-2025-32983

Related Product(s): nGeniusONE

First Published: 

Summary
NETSCOUT nGeniusONE before 6.4.0 b2350 allows Technical Information Disclosure via a Stack.

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software
Customers should install build 6.4.0 b2350 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.
techsupport@netscout.com

CVE-2025-32982 Broken Authorization Schema nGeniusONE High

Broken Authorization Schema

CVE-2025-32982

Related Product(s): nGeniusONE

First Published: 

Summary
NETSCOUT nGeniusONE before 6.4.0 b2350 has a Broken Authorization Schema for the report module.

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software
Customers should install build 6.4.0 b2350 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.
techsupport@netscout.com
 

CVE-2025-32981 Insecure Permissions nGeniusONE High

Insecure Permissions

CVE-2025-32981

Related Product(s): nGeniusONE

First Published: 

Summary
NETSCOUT nGeniusONE before 6.4.0 b2350 allows local users to leverage Insecure Permissions for the nGeniusCLI File. 

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software
Customers should install build 6.4.0 b2350 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.
techsupport@netscout.com

CVE-2025-32979 Arbitrary File Creation nGeniusONE Medium

Arbitrary File Creation

CVE-2025-32979

Related Product(s): nGeniusONE

First Published: 

Summary
NETSCOUT nGeniusONE before 6.4.0 b2350 allows an Arbitrary File Creation.

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software
Customers should install build 6.4.0 b2350 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.
techsupport@netscout.com
 

CVE-2025-32980 Weak Sudo Configuration nGeniusONE Critical

Weak Sudo Configuration

CVE-2025-32980

Related Product(s): nGeniusONE

CVSS Score: 9.80

First Published: 

Summary

NETSCOUT nGeniusONE before 6.4.0 P11 b3245 has a Weak Sudo Configuration.

We thank Jorge Escabias for reporting the vulnerability to techsupport@netscout.com.

Fixed Software

Customers should install build 6.4.0 P11 b3245 or later to eliminate this vulnerability. The build is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note that all future versions will include this fix.

techsupport@netscout.com

CVE-2023-41905 Reflected Cross-Site Scripting (XSS) nGeniusONE Medium

Reflected Cross-Site Scripting (XSS)

CVE-2023-41905

Related Product(s): nGeniusONE

First Published: 

Summary

NETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Reflected Cross-Site scripting vulnerability.

NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com.

Fixed Software

Customers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-41172 Stored Cross-Site Scripting (XSS) nGeniusONE Medium

Stored Cross-Site Scripting (XSS)

CVE-2023-41172

Related Product(s): nGeniusONE

First Published: 

Summary

NETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability.

NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com.

Fixed Software

Customers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-41171 Stored Cross-Site Scripting (XSS) nGeniusONE Medium

Stored Cross-Site Scripting (XSS)

CVE-2023-41171

Related Product(s): nGeniusONE

First Published: 

Summary

NETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability.

NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com.

Fixed Software

Customers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-41170 Stored Cross-Site Scripting (XSS) nGeniusONE Medium

Stored Cross-Site Scripting (XSS)

CVE-2023-41170

Related Product(s): nGeniusONE

First Published: 

Summary

NETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability.

NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com.

Fixed Software

Customers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-41169 Stored Cross-Site Scripting (XSS) nGeniusONE Medium

Stored Cross-Site Scripting (XSS)

CVE-2023-41169

Related Product(s): nGeniusONE

First Published: 

Summary

NETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability.

NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com.

Fixed Software

Customers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-41168 Stored Cross-Site Scripting (XSS) nGeniusONE Medium

Stored Cross-Site Scripting (XSS)

CVE-2023-41168

Related Product(s): nGeniusONE

First Published: 

Summary

NETSCOUT Systems in nGeniusONE version 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability.

NetScout Systems would like to acknowledge Roberto Suggi Liverani and Filip Waeytens from the NATO Cyber Security Centre (NCSC) for reporting the vulnerability to techsupport@netscout.com.

Fixed Software

Customers should install patch 6.3.4 P17 B2382 or later to eliminate this vulnerability. The patch is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-40302 Weak File Permissions nGeniusPULSE Critical

Weak File Permissions

CVE-2023-40302

Related Product(s): nGeniusPULSE

First Published: 

Summary

NETSCOUT Systems in nGeniusPULSE version 3.8.0-0.2349.0.allows a Weak File Permissions vulnerability.

NetScout Systems would like to acknowledge Waeytens Filip and Christophe Schleypen at NCIA for reporting CVE-2023-40301 to techsupport@netscout.com.

Fixed Software

Customers should install version 3.11.0-0.397.0 or above to eliminate this vulnerability. The release is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-40301 Command Injection nGeniusPULSE Critical

Command Injection

CVE-2023-40301

Related Product(s): nGeniusPULSE

First Published: 

Summary

NETSCOUT Systems in nGeniusPULSE version 3.8.0-0.2349.0.allows a Command Injection vulnerability.

NetScout Systems would like to acknowledge Waeytens Filip and Christophe Schleypen at NCIA for reporting CVE-2023-40301 to techsupport@netscout.com.

Fixed Software

Customers should install version 3.11.0-0.397.0 or above to eliminate this vulnerability. The release is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com

CVE-2023-40300 Hardcoded Cryptographic Key nGeniusPULSE Critical

Hardcoded Cryptographic Key

CVE-2023-40300

Related Product(s): nGeniusPULSE

First Published: 

Summary

NETSCOUT Systems in nGeniusPULSE version 3.8.0-0.2349.0.allows a Hardcoded Cryptographic Key vulnerability.

NetScout Systems would like to acknowledge Waeytens Filip and Christophe Schleypen at NCIA for reporting CVE-2023-40301 to techsupport@netscout.com.

Fixed Software

Customers should install version 3.11.0-0.397.0 or above to eliminate this vulnerability. The release is available on My NETSCOUT account page or may be obtained by contacting NETSCOUT support at 1-800-708-4784. Please note all future versions include this fix.

techsupport@netscout.com