On N-central, it is possible for any authenticated user to read, write and modify syslog configuration across customers on an N-central server. This vulnerability is present in all deployments of N-central prior to 2025.2.
| Software | From | Fixed in |
|---|---|---|
| n-able / n-central | - | 2025.2 |