
We found results for “”
CVE-2025-48057
Good to know:

Date: May 27, 2025
Icinga 2 is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. Prior to versions 2.12.12, 2.13.12, and 2.14.6, the VerifyCertificate() function can be tricked into incorrectly treating certificates as valid. This allows an attacker to send a malicious certificate request that is then treated as a renewal of an already existing certificate, resulting in the attacker obtaining a valid certificate that can be used to impersonate trusted nodes. This only occurs when Icinga 2 is built with OpenSSL older than version 1.1.0. This issue has been patched in versions 2.12.12, 2.13.12, and 2.14.6.
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Improper Following of a Certificate's Chain of Trust
CWE-296Top Fix

Upgrade Version
Upgrade to version https://github.com/Icinga/icinga2.git - v2.12.12;https://github.com/Icinga/icinga2.git - v2.13.12;https://github.com/Icinga/icinga2.git - v2.14.6
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |