Source: The Hacker News Author: info@thehackernews.com (The Hacker News) URL: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
-
ONE SENTENCE SUMMARY: A critical Cacti vulnerability (CVE-2025-22604, CVSS 9.1) enables authenticated remote code execution, urging immediate patching to version 1.2.29.
-
MAIN POINTS:
-
CVE-2025-22604 is a critical flaw in the Cacti monitoring framework with a CVSS score of 9.1.
-
The flaw allows authenticated attackers to execute arbitrary code through malformed OIDs in SNMP responses.
-
Exploitation could lead to data theft, modification, or deletion on vulnerable servers.
-
The vulnerability affects all Cacti versions up to and including 1.2.28.
-
The issue has been fixed in Cacti version 1.2.29, released this week.
-
Security researcher “u32i” discovered and reported the CVE-2025-22604 vulnerability.
-
Another flaw, CVE-2025-24367 (CVSS 7.2), allows creation of arbitrary PHP scripts for remote code execution.
-
CVE-2025-24367 exploits Cacti’s graph creation and template functionality in earlier versions.
-
Organizations using Cacti should prioritize patching to version 1.2.29 to mitigate risks.
-
Cacti vulnerabilities have been actively exploited in the past, highlighting the urgency for updates.
-
TAKEAWAYS:
-
Upgrade Cacti to version 1.2.29 immediately to address CVE-2025-22604 and CVE-2025-24367 vulnerabilities.
-
Authenticated attackers can exploit SNMP flaws for remote code execution on older Cacti versions.
-
Data integrity risks include theft, modification, and deletion if vulnerabilities are left unpatched.
-
Past exploitation history emphasizes the importance of timely patch application for Cacti users.
-
Monitoring software should always be kept updated to avoid security threats.