Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-40044: n/a in n/a

0
Medium
VulnerabilityCVE-2022-40044cvecve-2022-40044
Published: Mon Sep 26 2022 (09/26/2022, 15:38:18 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the esc_name (Escalation Name) parameter at Configuration/Notifications/Escalations. This vulnerability allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:28:37 UTC

Technical Analysis

CVE-2022-40044 is a cross-site scripting (XSS) vulnerability identified in Centreon version 20.10.18, specifically affecting the esc_name (Escalation Name) parameter within the Configuration/Notifications/Escalations module. Centreon is an IT infrastructure monitoring software widely used to oversee network, server, and application performance. The vulnerability arises because the esc_name parameter does not properly sanitize user input, allowing an attacker with at least limited privileges (PR:L) to inject malicious scripts or HTML code. When a user with appropriate access views the affected page, the injected payload executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions within the web application. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. The impact on confidentiality and integrity is low, with no impact on availability. No known exploits are reported in the wild, and no official patches or vendor advisories are linked, suggesting that mitigation may require manual configuration changes or updates when available. The vulnerability is classified under CWE-79, a common category for XSS issues, emphasizing the need for proper input validation and output encoding in web applications.

Potential Impact

For European organizations using Centreon 20.10.18, this vulnerability could allow attackers to execute malicious scripts within the context of the monitoring platform's web interface. Since Centreon often has privileged access to critical infrastructure monitoring data, exploitation could lead to unauthorized disclosure of sensitive information, manipulation of monitoring configurations, or pivoting to other internal systems. The requirement for low privileges and user interaction means that an attacker might leverage social engineering or compromised user accounts to trigger the exploit. While the direct impact on availability is negligible, the integrity and confidentiality risks could disrupt operational monitoring and incident response processes. Given the critical role of IT monitoring in sectors such as finance, healthcare, energy, and government within Europe, exploitation could degrade trust in system status reports or enable further attacks. However, the absence of known active exploits and the medium severity score indicate that the threat is moderate but should not be ignored, especially in environments with multiple users having escalation configuration privileges.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately review and restrict access to the Configuration/Notifications/Escalations section to only trusted administrators to minimize the risk of malicious input. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the esc_name parameter. 3) Monitor logs for unusual activity or unexpected input patterns in the escalation configuration interface. 4) Apply strict input validation and output encoding on the esc_name parameter if custom development or configuration is possible. 5) Stay updated with Centreon vendor communications for official patches or security updates addressing this vulnerability. 6) Educate users with escalation privileges about phishing and social engineering risks to reduce the likelihood of user interaction exploitation. 7) Consider isolating the Centreon web interface within a segmented network zone with limited access to reduce lateral movement potential.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-06T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682df35bc4522896dcc0658c

Added to database: 5/21/2025, 3:38:03 PM

Last enriched: 7/7/2025, 2:28:37 PM

Last updated: 2/3/2026, 3:00:37 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats