
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-61909 affects Icinga 2, an open source monitoring system, from versions 2.10.0 to before 2.15.1, 2.14.7, and 2.13.13. The vulnerability was discovered and disclosed on October 16, 2025. The issue involves the safe-reload script and logrotate configuration that read the PID of the main Icinga 2 process from a PID file writable by the daemon user but send signals as the root user (GitHub Advisory).
The vulnerability stems from a privilege escalation issue where the safe-reload script (used during systemctl reload icinga2) and logrotate configuration operate on a PID file that is writable by the daemon user while executing commands as root. The CVSS v4.0 score indicates a Medium severity with base metrics showing Local attack vector, Low attack complexity, Present attack requirements, High privileges required, and No user interaction needed (GitHub Advisory).
The vulnerability allows the Icinga user to send signals to processes it would otherwise not be permitted to access. This creates a potential privilege escalation path where the daemon user could trick root into sending signals to arbitrary processes in the system. The PID file could be replaced by a symbolic link or a named pipe, potentially leading to local denial-of-service against the reload invocation (GitHub Issue).
The vulnerability has been patched in Icinga 2 versions 2.15.1, 2.14.7, and 2.13.13. For the logrotate configuration fix, users need to verify that /etc/logrotate.d/icinga2 uses the command "$DAEMON" internal signal --sig SIGHUP --pid "$pid" instead of kill -HUP "$pid". Due to package manager configuration file handling, manual verification and potential manual updates may be required if the file was previously modified locally (Icinga Blog).
The vulnerability was responsibly disclosed and acknowledged by Icinga, with credit given to Matthias Gerstner for finding and reporting the issue. The vendor promptly released security updates across multiple version branches to address the vulnerability (Icinga Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."