Unauthenticated configuration import allows administrative account creation using AWIE component
翻译中…平台
other
组件
centreon-awie
修复版本
25.10.2
24.10.3
24.04.3
CVE-2025-15026 describes a critical vulnerability within the Awie import module of Centreon Infra Monitoring. This flaw allows attackers to bypass access control lists (ACLs) and access functionality without proper authentication, potentially leading to unauthorized data access and system manipulation. The vulnerability affects versions 24.04.0 through 25.10.2 of Centreon Infra Monitoring, and a fix is available in version 25.10.2.
影响与攻击场景翻译中…
The core of this vulnerability lies in the missing authentication check for critical functions within the Awie import module. An attacker who can exploit this flaw can bypass the intended security controls and gain access to sensitive data or execute unauthorized actions within the Centreon environment. This could include modifying monitoring configurations, accessing confidential reports, or even potentially escalating privileges to gain control of the entire system. The impact is particularly severe given Centreon's role in monitoring critical infrastructure, where unauthorized access could lead to disruptions and data loss. Successful exploitation could mirror the impact of privilege escalation vulnerabilities seen in other monitoring platforms, allowing attackers to gain a foothold and move laterally within the network.
利用背景翻译中…
CVE-2025-15026 was publicly disclosed on 2026-01-05. The CVSS score of 9.8 indicates a critical severity. As of this writing, there are no publicly available proof-of-concept exploits. The vulnerability has been added to the CISA KEV catalog, indicating a heightened risk of exploitation. Active campaigns targeting Centreon are not currently known, but the critical nature of the vulnerability warrants close monitoring.
哪些人处于风险中翻译中…
Organizations heavily reliant on Centreon Infra Monitoring for critical infrastructure management are particularly at risk. Environments with legacy configurations or those using shared hosting models where the Centreon instance is not adequately isolated are also more vulnerable. Any deployment utilizing versions 24.04.0 through 25.10.2 is potentially exposed.
攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
0.05% (14% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2025-15026 is to immediately upgrade Centreon Infra Monitoring to version 25.10.2 or later. If upgrading is not immediately feasible due to compatibility concerns or testing requirements, consider implementing temporary workarounds. While a direct ACL bypass mitigation is difficult without patching, restrict network access to the Awie import module using firewalls or network segmentation to limit the potential attack surface. Review and strengthen existing authentication mechanisms for other Centreon components to reduce the overall risk profile. After upgrading, verify the fix by attempting to access restricted functionality without proper authentication credentials; access should be denied.
修复方法翻译中…
Actualice Centreon Infra Monitoring a la versión 25.10.2, 24.10.3 o 24.04.3, o posterior. Esto corregirá la vulnerabilidad de autenticación faltante en el módulo Awie import, impidiendo la creación no autorizada de cuentas administrativas.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2025-15026 — ACL Bypass in Centreon Infra Monitoring?
CVE-2025-15026 is a critical vulnerability in Centreon Infra Monitoring's Awie import module allowing attackers to bypass access controls and access functionality without authentication.
Am I affected by CVE-2025-15026 in Centreon Infra Monitoring?
Yes, if you are using Centreon Infra Monitoring versions 24.04.0 through 25.10.2, you are potentially affected by this vulnerability.
How do I fix CVE-2025-15026 in Centreon Infra Monitoring?
Upgrade Centreon Infra Monitoring to version 25.10.2 or later to remediate the vulnerability. Consider temporary network restrictions if immediate upgrade is not possible.
Is CVE-2025-15026 being actively exploited?
While no active campaigns are currently known, the critical nature of the vulnerability warrants close monitoring and proactive mitigation.
Where can I find the official Centreon advisory for CVE-2025-15026?
Refer to the official Centreon security advisory for detailed information and guidance regarding CVE-2025-15026.