Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-49369

Опубликовано: 12 нояб. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 9.8

Описание

Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.

РелизСтатусПримечание
devel

not-affected

2.14.5-1
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

needs-triage

oracular

ignored

end of life, was needs-triage

Показывать по

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 1 года назад

Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.

CVSS3: 9.8
debian
около 1 года назад

Icinga is a monitoring system which checks the availability of network ...

suse-cvrf
около 1 года назад

Security update for icinga2

suse-cvrf
около 1 года назад

Security update for icinga2

CVSS3: 9.8
fstec
больше 1 года назад

Уязвимость функции set_verify_callback() системы мониторинга доступности сетевых ресурсов Icinga, позволяющая нарушителю обойти ограничения безопасности, получить несанкционированный доступ к защищаемой информации или выполнить произвольные команды

9.8 Critical

CVSS3