Authenticated command injection in SNMP options of a Device
CVE-2023-39362
Key Information:
Badges
What is CVE-2023-39362?
Cacti, an open source operational monitoring framework, has a vulnerability that allows authenticated privileged users to execute arbitrary commands on the server. This issue arises in version 1.2.24 when a malicious string is manipulated in the SNMP options of a device, leading to remote code execution due to inadequate input validation in the lib/snmp.php
script. The vulnerability has been resolved in version 1.2.25, and users are strongly encouraged to upgrade as there are no known workarounds.
Affected Version(s)
cacti < 1.2.25
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
86% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
- 🟡
Public PoC available
- 👾
Exploit known to exist