First published: Mon Jan 27 2025(Updated: )
Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <1.2.29 | |
<1.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of CVE-2025-22604 is considered to be high due to its potential for exploitation by authenticated users.
To fix CVE-2025-22604, upgrade Cacti to version 1.2.30 or later where the vulnerability has been addressed.
CVE-2025-22604 affects all versions of Cacti up to and including 1.2.29.
CVE-2025-22604 can enable crafted OID injections by authenticated users, potentially leading to data manipulation or service disruption.
Yes, authentication is required to exploit CVE-2025-22604, as the vulnerability affects authenticated users only.