Article Details

Scrape Timestamp (UTC): 2024-05-14 11:22:29.323

Source: https://thehackernews.com/2024/05/critical-flaws-in-cacti-framework-could.html

Original Article Text

Click to Toggle View

Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code. The maintainers of the Cacti open-source network monitoring and fault management framework have addressed a dozen security flaws, including two critical issues that could lead to the execution of arbitrary code. The most severe of the vulnerabilities are listed below - Also addressed by Cacti are two other high-severity flaws that could lead to code execution via SQL injection and file inclusion - It's worth noting that 10 out of the 12 flaws, with the exception of CVE-2024-29895 and CVE-2024-30268 (CVSS score: 6.1), impact all versions of Cacti, including and prior to 1.2.26. They have been addressed in version 1.2.27 released on May 13, 2024. The two other flaws affect the development versions 1.3.x. The development comes more than eight months after the disclosure of another critical SQL injection vulnerability (CVE-2023-39361, CVSS score: 9.8) that could permit an attacker to obtain elevated permissions and execute malicious code. In early 2023, a third critical flaw tracked as CVE-2022-46169 (CVSS score: 9.8) came under active exploitation in the wild, allowing threat actors to breach internet-exposed Cacti servers to deliver botnet malware such as MooBot and ShellBot. With proof-of-concept (PoC) exploits publicly available for these shortcomings (in the respective GitHub advisories), it's recommended that users take steps to update their instances to the latest version as soon as possible to mitigate potential threats.

Daily Brief Summary

MALWARE // Cacti Network Monitoring Vulnerabilities Risk Malicious Code Execution

Cacti has patched 12 security issues, including two critical vulnerabilities allowing arbitrary code execution.

Flaws primarily affect all Cacti versions up to and including 1.2.26, resolved in the recently released version 1.2.27.

The two most severe vulnerabilities involve potential SQL injection and file inclusion attacks.

Additional critical vulnerabilities previously identified have led to active exploitations, enabling attackers to use Cacti servers to distribute botnet malware.

Users are urged to upgrade to the latest version to prevent exploitation, particularly due to publicly available proof-of-concept exploits.

The ongoing vulnerability management underscores the importance of regular updates and monitoring in safeguarding network frameworks from emerging threats.