CVE-2024-49369

NameCVE-2024-49369
DescriptionIcinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3953-1
Debian Bugs1087384

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
icinga2 (PTS)bullseye2.12.3-1vulnerable
bullseye (security)2.12.3-1+deb11u1fixed
bookworm2.13.6-2+deb12u1vulnerable
sid, trixie2.14.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
icinga2sourcebullseye2.12.3-1+deb11u1DLA-3953-1
icinga2source(unstable)2.14.3-11087384

Notes

[bookworm] - icinga2 <no-dsa> (Will be fixed via point release; Only affects deployments with access to Icinga API via client certificates)
https://github.com/Icinga/icinga2/security/advisories/GHSA-j7wq-r9mg-9wpv
https://icinga.com/blog/2024/11/12/critical-icinga-2-security-releases-2-14-3/
Fixed by: https://github.com/Icinga/icinga2/commit/2febc5e18ae0c93d989e64ebc2a9fd90e7205ad8 (v2.14.3)
Fixed by: https://github.com/Icinga/icinga2/commit/3504fc7ed688c10d86988e2029a65efc311393fe (v2.13.10)
Fixed by: https://github.com/Icinga/icinga2/commit/0419a2c36de408e9a703aec0962061ec9a285d3c (v2.12.11)
Fixed by: https://github.com/Icinga/icinga2/commit/8fed6608912c752b337d977f730547875a820831 (v2.11.12)

Search for package or bug name: Reporting problems