Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
Metrics
Affected Vendors & Products
References
History
Mon, 27 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 27 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29. | |
Title | Cacti has Authenticated RCE via multi-line SNMP responses | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-27T17:06:58.215Z
Updated: 2025-01-27T18:46:27.145Z
Reserved: 2025-01-07T15:07:26.775Z
Link: CVE-2025-22604

Updated: 2025-01-27T18:46:06.785Z

Status : Received
Published: 2025-01-27T17:15:17.307
Modified: 2025-01-27T17:15:17.307
Link: CVE-2025-22604

No data.