A crucial vulnerability (CVE-2025-48057) has been found in Icinga 2, the broadly used open-source monitoring platform.
The flaw, affecting installations constructed with OpenSSL variations older than 1.1.0, might permit attackers to acquire legitimate certificates from the Icinga Certificates Authority (CA), probably impersonating trusted nodes and compromising monitoring environments.
Safety updates have been launched in variations 2.14.6, 2.13.12, and a pair of.12.12, and quick motion is urged for affected techniques.
Exploiting Certificates Validation
On the coronary heart of this safety problem lies the VerifyCertificate()
perform.
In susceptible Icinga 2 builds (utilizing OpenSSL <1.1.0), this perform may be tricked into treating malicious certificates as legitimate.
Particularly, OpenSSL variations earlier than 1.1.0 maintained a “legitimate” flag throughout the certificates object.
If set by a earlier operation, this flag might trigger crucial verification steps to be skipped, leading to improper validation of certificates requests.
Attackers exploiting this flaw might ship a crafted certificates request that seems as a renewal of an present certificates.
If the Icinga 2 grasp node (with CA signing functionality) is accessible by way of TLS, the attacker might get hold of a legitimate certificates, enabling them to impersonate trusted nodes throughout the monitoring cluster.
Technical Verification Command:
bashicinga2 --version | grep OpenSSL
If the output signifies OpenSSL 1.1.0 or newer, the set up is just not affected.
Influence and Affected Platforms
This vulnerability is rated crucial, with a CVSS v4.0 rating of 9.3, reflecting its excessive potential influence on confidentiality, integrity, and availability.
The flaw primarily impacts techniques operating Icinga 2 on platforms like RHEL 7 and Amazon Linux 2, which ship with OpenSSL 1.0.2 by default.
Desk: Affected and Patched Variations
Icinga 2 Model | Weak (OpenSSL <1.1.0) | Patched Model |
---|---|---|
≤ 2.14.5 | Sure | 2.14.6 |
≤ 2.13.11 | Sure | 2.13.12 |
≤ 2.12.11 | Sure | 2.12.12 |
Patches, Workarounds, and Suggestions
Safety Fixes
The vulnerability has been addressed in Icinga 2 variations 2.14.6, 2.13.12, and a pair of.12.12. These releases additionally embrace:
- A repair for a use-after-free bug in
VerifyCertificate()
, which beforehand might lead to incorrect error codes in logs. - An replace to OpenSSL v3.0.16 for Home windows builds.
- Numerous minor construct and documentation enhancements.
Fast Actions
- Improve: Customers operating Icinga 2 on OpenSSL 1.0.2 or older should improve to a patched model instantly.
- Limit Entry: Restrict community entry to Icinga 2 grasp nodes able to signing certificates to solely trusted entities.
- Short-term Workaround: Cease the grasp from signing new certificates by renaming the
/var/lib/icinga2/ca
listing. Be aware: This may halt new node setups and certificates renewals, making it a short-term answer solely.
Instance Workaround Command
bashmv /var/lib/icinga2/ca /var/lib/icinga2/ca.disabled
Organizations utilizing Icinga 2 with OpenSSL variations older than 1.1.0 face a extreme threat of certificate-based impersonation assaults.
Fast patching is important to keep up the integrity and safety of monitoring environments.
For full technical particulars and supply code, seek the advice of the official Icinga repositories and advisories.
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get On the spot Updates!