Name | CVE-2025-48057 |
Description | Icinga 2 is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. Prior to versions 2.12.12, 2.13.12, and 2.14.6, the VerifyCertificate() function can be tricked into incorrectly treating certificates as valid. This allows an attacker to send a malicious certificate request that is then treated as a renewal of an already existing certificate, resulting in the attacker obtaining a valid certificate that can be used to impersonate trusted nodes. This only occurs when Icinga 2 is built with OpenSSL older than version 1.1.0. This issue has been patched in versions 2.12.12, 2.13.12, and 2.14.6. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
icinga2 (PTS) | bullseye | 2.12.3-1 | vulnerable |
bullseye (security) | 2.12.3-1+deb11u1 | vulnerable | |
bookworm | 2.13.6-2+deb12u2 | vulnerable | |
sid, trixie | 2.14.6-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
icinga2 | source | (unstable) | 2.14.6-1 |
Fixed by: https://github.com/Icinga/icinga2/security/advisories/GHSA-7vcf-f5v9-3wr6
Fixed by: https://github.com/Icinga/icinga2/commit/4023128be42b18a011dda71ddee9ca79955b89cb (master)
Fixed by: https://github.com/Icinga/icinga2/commit/9ad5683aab9eb392c6737ff46c830a945c9e240f (v2.14.6)
Fixed by: https://github.com/Icinga/icinga2/commit/60f75f4a3d5cbb234eb3694ba7e9076a1a5b8776 (v2.13.12)
Fixed by: https://github.com/Icinga/icinga2/commit/9b2c05d0cc09210bdeade77cf9a73859250fc48d (v2.12.12)
Fxied by: https://github.com/Icinga/icinga2/commit/34c93a2542bbe4e9886d15bc17ec929ead1aa152 (v2.12.12)