Description

Icinga has issued urgent security updates to address a critical vulnerability (CVE-2024-49369) in its open-source monitoring platform, Icinga 2. The flaw impacts all versions of the software starting from 2.4.0 and enables attackers to bypass TLS certificate validation. This could allow unauthorized users to impersonate trusted cluster nodes or API users, potentially leading to remote code execution and configuration manipulation. According to Icinga’s security advisory, the vulnerability stems from a flaw in the platform's TLS certificate validation process. Attackers could exploit this issue to: Impersonate trusted cluster nodes: By pretending to be a master or satellite node, malicious actors can inject harmful configuration updates or execute arbitrary commands on other nodes within the Icinga cluster. Impersonate API users: Unauthorized users could gain access with the same permissions as legitimate API users, enabling them to modify configurations or execute commands. Icinga describes the vulnerability as highly impactful, noting that “most installations” are likely to be affected. With a CVSS score of 9.8, the issue is categorized as critical. To mitigate the risk, Icinga has released updated versions to address the flaw, including v2.14.3, v2.13.10, v2.12.11, and v2.11.12. Users are strongly advised to upgrade to these patched versions immediately. Updated packages can be obtained from Icinga's official repositories, including packages.icinga.com, the Icinga for Windows repository, Docker Hub, and the Helm Chart repository.