We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49369

Icinga 2 has a TLS Certificate Validation Bypass for JSON-RPC and HTTP API Connections



Description

Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.

Reserved 2024-10-14 | Published 2024-11-12 | Updated 2024-11-12 | Assigner GitHub_M


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-295: Improper Certificate Validation

Product status

>= 2.4.0, < 2.11.12
affected

>= 2.12.0, < 2.12.11
affected

>= 2.13.0, < 2.13.10
affected

>= 2.14.0, < 2.14.3
affected

References

github.com/...cinga2/security/advisories/GHSA-j7wq-r9mg-9wpv

github.com/...ommit/0419a2c36de408e9a703aec0962061ec9a285d3c

github.com/...ommit/2febc5e18ae0c93d989e64ebc2a9fd90e7205ad8

github.com/...ommit/3504fc7ed688c10d86988e2029a65efc311393fe

github.com/...ommit/869a7d6f0fe38c748e67bacc1fbdd42c933030f6

github.com/...ommit/8fed6608912c752b337d977f730547875a820831

icinga.com/.../12/critical-icinga-2-security-releases-2-14-3

cve.org (CVE-2024-49369)

nvd.nist.gov (CVE-2024-49369)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-49369

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.