Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33854: n/a

0
Critical
VulnerabilityCVE-2024-33854cvecve-2024-33854
Published: Fri Aug 23 2024 (08/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A SQL Injection vulnerability exists in the Graph Template component in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:03:55 UTC

Technical Analysis

CVE-2024-33854 is a critical SQL Injection vulnerability identified in the Graph Template component of Centreon Web, an IT infrastructure monitoring platform widely used by enterprises and service providers. The vulnerability affects multiple versions: 22.10.x before 22.10.23, 23.04.x before 23.04.19, 23.10.x before 23.10.13, and 24.04.x before 24.04.3. The flaw allows remote attackers to inject malicious SQL queries without requiring authentication or user interaction, exploiting improper input validation or sanitization in the Graph Template feature. This can lead to unauthorized disclosure of sensitive information, data manipulation, or potentially further compromise of the underlying database and application integrity. The CVSS v3.1 score of 9.1 reflects the vulnerability's high impact on confidentiality and integrity, with network attack vector and low attack complexity. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise monitoring infrastructure or extract sensitive operational data. The vulnerability is categorized under CWE-89, indicating it stems from classic SQL Injection coding errors. Centreon Web is often deployed in critical environments, increasing the potential severity of exploitation. The absence of provided patch links suggests organizations should consult official Centreon advisories or support channels for updates.

Potential Impact

The impact of CVE-2024-33854 is significant for organizations relying on Centreon Web for monitoring IT infrastructure. Successful exploitation can lead to unauthorized access to sensitive monitoring data, including system statuses, network configurations, and potentially credentials stored in the database. Attackers could manipulate monitoring data, causing false alerts or hiding critical system failures, which undermines operational security and incident response. The integrity of monitoring systems is crucial for maintaining uptime and security posture; thus, this vulnerability could indirectly facilitate further attacks or prolonged outages. Since exploitation requires no authentication or user interaction, the attack surface is broad, increasing the likelihood of automated scanning and exploitation attempts. Organizations in sectors such as finance, healthcare, telecommunications, and government, where Centreon Web is used to monitor critical infrastructure, face heightened risks of data breaches and operational disruption. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2024-33854, organizations should immediately identify all Centreon Web instances and verify their versions against the affected releases. Applying the latest patches or updates provided by Centreon that address this SQL Injection vulnerability is the most effective mitigation. If patches are not yet available, organizations should consider temporary workarounds such as restricting network access to Centreon Web interfaces using firewalls or VPNs, limiting exposure to trusted administrators only. Implementing Web Application Firewalls (WAFs) with rules to detect and block SQL Injection attempts targeting Centreon Web can provide additional protection. Regularly auditing and monitoring logs for suspicious SQL query patterns or anomalous access attempts can help detect exploitation attempts early. Additionally, following secure coding practices and input validation for custom plugins or extensions in Centreon Web can reduce risk. Organizations should also ensure database accounts used by Centreon Web have the least privileges necessary to limit damage if exploited. Finally, maintaining an incident response plan that includes Centreon Web monitoring systems will help quickly contain and remediate any compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c47b7ef31ef0b561da6

Added to database: 2/25/2026, 9:40:23 PM

Last enriched: 2/28/2026, 3:03:55 AM

Last updated: 4/12/2026, 7:55:41 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses