CVE-2021-32739
Icinga vulnerability analysis and mitigation

Overview

A privilege escalation vulnerability (CVE-2021-32739) was discovered in Icinga2, a general-purpose monitoring application, affecting versions 2.4.0 through 2.12.4. The vulnerability allows authenticated API users with read-only permissions to access sensitive configuration attributes (GitHub Advisory, Debian LTS).

Technical details

The vulnerability allows authenticated API users with read-only permissions to view attributes of all config objects, including the ticket_salt of ApiListener. This salt can be used to compute a ticket for any common name (CN). Combined with the master node's certificate and a self-signed certificate, an attacker can successfully request desired certificates from Icinga, which can then be used to steal endpoint or API user identities (GitHub Advisory).

Impact

The vulnerability enables privilege escalation where an attacker with read-only API access can potentially gain administrative access to the system. By obtaining the ticket salt, attackers can generate valid certificates for any identity, effectively bypassing the intended access controls (GitHub Advisory).

Mitigation and workarounds

Users should upgrade to version 2.12.5 or 2.11.10 which contain the fix. Alternative workarounds include explicitly specifying queryable types in API user permissions or filtering out ApiListener objects using permission filters. Additionally, it is recommended to change the ticket salt and replace the Icinga CA after applying the update (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Icinga vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-48057CRITICAL9.3
  • IcingaIcinga
  • vim-icinga2
NoYesMay 27, 2025
CVE-2025-61908HIGH7.1
  • IcingaIcinga
  • cpe:2.3:a:icinga:icinga
NoYesOct 16, 2025
CVE-2025-61907HIGH7.1
  • IcingaIcinga
  • icinga2
NoYesOct 16, 2025
CVE-2025-23203MEDIUM5.5
  • IcingaIcinga
  • icingaweb2-module-director
NoYesMar 26, 2025
CVE-2025-61909MEDIUM4
  • IcingaIcinga
  • cpe:2.3:a:icinga:icinga
NoYesOct 16, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management