On N-central, it is possible for any authenticated user to read, write and modify syslog configuration across customers on an N-central server. This vulnerability is present in all deployments of N-central prior to 2025.2.
Solution:
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.