CVE-2023-39362
Cacti vulnerability analysis and mitigation

Overview

A command injection vulnerability (CVE-2023-39362) was discovered in Cacti version 1.2.24. The vulnerability affects authenticated privileged users who can exploit malicious strings in the SNMP options of a Device to achieve remote code execution on the underlying server. This vulnerability was disclosed on September 5, 2023, and has been assigned a CVSS score of 7.2 (High) (GitHub Advisory).

Technical details

The vulnerability exists in the lib/snmp.php file, which contains functions that accept input variables and place them into an exec call without proper escape or validation. The affected functions include cactisnmpget, cactisnmpgetraw, cactisnmpgetnext, and cactisnmpwalk. The security flaw stems from insufficient validation of the $community parameter in the cactisnmpoptionssanitize function, where only a comparison with an empty string is performed when SNMP version is not 3. The vulnerability can be exploited when the snmp module of PHP is not installed, which is considered optional during Cacti installation (GitHub Advisory).

Impact

If successfully exploited, this vulnerability allows an authenticated privileged user to execute arbitrary commands on the underlying server where Cacti is installed. This could potentially lead to complete system compromise and provide attackers with the ability to reach other monitored hosts (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Cacti version 1.2.25. Users are strongly advised to upgrade to this version or later. The issue has also been addressed in version 1.3.0. Various Linux distributions have released security updates to address this vulnerability, including Debian and Fedora (Debian Security, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Cacti vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26520CRITICAL9.8
  • CactiCacti
  • cacti
NoYesFeb 12, 2025
CVE-2005-10004HIGH8.7
  • CactiCacti
  • cacti
NoYesAug 30, 2025
CVE-2025-24367HIGH8.7
  • CactiCacti
  • cacti
NoYesJan 27, 2025
CVE-2025-66399HIGH7.4
  • CactiCacti
  • cacti
NoYesDec 02, 2025
CVE-2025-24368MEDIUM6.9
  • CactiCacti
  • cacti
NoYesJan 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management