Source: The Hacker News Author: [email protected] (The Hacker News) URL: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
ONE SENTENCE SUMMARY:
A critical Cacti vulnerability (CVE-2025-22604, CVSS 9.1) enables authenticated remote code execution, urging immediate patching to version 1.2.29.
MAIN POINTS:
- CVE-2025-22604 is a critical flaw in the Cacti monitoring framework with a CVSS score of 9.1.
- The flaw allows authenticated attackers to execute arbitrary code through malformed OIDs in SNMP responses.
- Exploitation could lead to data theft, modification, or deletion on vulnerable servers.
- The vulnerability affects all Cacti versions up to and including 1.2.28.
- The issue has been fixed in Cacti version 1.2.29, released this week.
- Security researcher “u32i” discovered and reported the CVE-2025-22604 vulnerability.
- Another flaw, CVE-2025-24367 (CVSS 7.2), allows creation of arbitrary PHP scripts for remote code execution.
- CVE-2025-24367 exploits Cacti’s graph creation and template functionality in earlier versions.
- Organizations using Cacti should prioritize patching to version 1.2.29 to mitigate risks.
- Cacti vulnerabilities have been actively exploited in the past, highlighting the urgency for updates.
TAKEAWAYS:
- Upgrade Cacti to version 1.2.29 immediately to address CVE-2025-22604 and CVE-2025-24367 vulnerabilities.
- Authenticated attackers can exploit SNMP flaws for remote code execution on older Cacti versions.
- Data integrity risks include theft, modification, and deletion if vulnerabilities are left unpatched.
- Past exploitation history emphasizes the importance of timely patch application for Cacti users.
- Monitoring software should always be kept updated to avoid security threats.