
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-49369 is a critical vulnerability (CVSS 9.8) discovered in Icinga 2, a monitoring system that checks network resources availability. The vulnerability affects all versions from 2.4.0 onwards, where a flaw in TLS certificate validation could allow attackers to impersonate both trusted cluster nodes and API users utilizing TLS client certificates for authentication. The vulnerability was discovered by Finn Steglich and fixed in versions v2.14.3, v2.13.10, v2.12.11, and v2.11.12 released on November 12, 2024 (Icinga Blog, GitHub Advisory).
The vulnerability stems from a flaw in the TLS certificate validation mechanism that could be bypassed, allowing unauthorized access to the system. The issue affects the JSON-RPC and HTTP API connections, where the certificate validation checks were improperly implemented. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (GitHub Advisory).
The vulnerability's impact is severe, allowing attackers to impersonate trusted cluster nodes and potentially execute malicious actions. When impersonating a master or satellite node, attackers can supply malicious configuration updates (if acceptconfig is enabled) or execute arbitrary commands (if acceptcommands is enabled). Even without these permissions, attackers can still access sensitive information. For API user impersonation, the impact varies based on the configured permissions of certificate-authenticated users (Icinga Blog).
The primary mitigation is to upgrade to the patched versions immediately: v2.14.3, v2.13.10, v2.12.11, or v2.11.12. Updated packages are available on packages.icinga.com, the Icinga for Windows repository, Docker Hub, and the Helm Chart repository. As a temporary workaround, organizations can restrict access to the Icinga 2 API port using firewalls to reduce the attack surface, though this is not a complete solution (Icinga Blog).
The vulnerability has been treated with high priority by Icinga, with the company releasing patches across multiple version branches simultaneously. The security community has noted the critical nature of the vulnerability, particularly given its high CVSS score and the potential for unauthorized system access (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”