CVE-2024-45757: n/a in n/a
An issue was discovered in Centreon centreon-bam 24.04, 23.10, 23.04, and 22.10. SQL injection can occur in the user-settings form. Exploitation is only accessible to authenticated users with high-privileged access.
AI Analysis
Technical Summary
CVE-2024-45757 is a high-severity SQL injection vulnerability identified in Centreon BAM (Business Activity Monitoring) versions 22.10, 23.04, 23.10, and 24.04. Centreon BAM is a monitoring solution used to visualize and analyze IT infrastructure and business processes. The vulnerability exists in the user-settings form, where insufficient input sanitization allows an authenticated user with high privileges to inject malicious SQL commands. This flaw stems from improper handling of user-supplied data in SQL queries, classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Exploiting this vulnerability could enable attackers to manipulate backend databases, leading to unauthorized data disclosure, modification, or deletion, and potentially full system compromise. The CVSS 3.1 base score of 7.2 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required beyond authentication. Although exploitation requires high-privileged authenticated access, the vulnerability is critical because it can be leveraged to escalate privileges or pivot within the network. No public exploits have been reported yet, and no patches are currently linked, indicating the need for immediate attention by affected organizations.
Potential Impact
For European organizations using Centreon BAM, this vulnerability poses significant risks. Centreon is widely adopted in Europe, especially among enterprises and public sector entities for IT infrastructure monitoring. Successful exploitation could lead to unauthorized access to sensitive monitoring data, manipulation of business activity metrics, and disruption of operational visibility. This can impair incident response and risk management capabilities. Moreover, attackers could leverage the SQL injection to extract credentials or inject malicious payloads, facilitating lateral movement and further compromise. Given the high privileges required, insider threats or compromised administrative accounts are primary vectors, increasing the risk of insider attacks or advanced persistent threats (APTs). The impact extends to regulatory compliance, as data breaches involving monitoring data may violate GDPR and other data protection laws, leading to legal and financial penalties. The availability impact could disrupt critical monitoring services, affecting business continuity.
Mitigation Recommendations
To mitigate CVE-2024-45757, organizations should: 1) Immediately review and restrict access to Centreon BAM user-settings forms, ensuring only trusted administrators have high-privileged accounts. 2) Implement strict input validation and parameterized queries in the application code to prevent SQL injection, if possible through vendor updates or custom patches. 3) Monitor logs for unusual database queries or access patterns indicative of exploitation attempts. 4) Employ network segmentation to isolate Centreon BAM servers and limit exposure to internal threat actors. 5) Enforce multi-factor authentication (MFA) for all administrative accounts to reduce risk from compromised credentials. 6) Regularly audit user privileges and remove unnecessary high-level access. 7) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider deploying Web Application Firewalls (WAFs) with SQL injection detection rules as a temporary protective measure. 9) Conduct security awareness training focused on insider threat risks and secure credential management.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2024-45757: n/a in n/a
Description
An issue was discovered in Centreon centreon-bam 24.04, 23.10, 23.04, and 22.10. SQL injection can occur in the user-settings form. Exploitation is only accessible to authenticated users with high-privileged access.
AI-Powered Analysis
Technical Analysis
CVE-2024-45757 is a high-severity SQL injection vulnerability identified in Centreon BAM (Business Activity Monitoring) versions 22.10, 23.04, 23.10, and 24.04. Centreon BAM is a monitoring solution used to visualize and analyze IT infrastructure and business processes. The vulnerability exists in the user-settings form, where insufficient input sanitization allows an authenticated user with high privileges to inject malicious SQL commands. This flaw stems from improper handling of user-supplied data in SQL queries, classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). Exploiting this vulnerability could enable attackers to manipulate backend databases, leading to unauthorized data disclosure, modification, or deletion, and potentially full system compromise. The CVSS 3.1 base score of 7.2 reflects a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required beyond authentication. Although exploitation requires high-privileged authenticated access, the vulnerability is critical because it can be leveraged to escalate privileges or pivot within the network. No public exploits have been reported yet, and no patches are currently linked, indicating the need for immediate attention by affected organizations.
Potential Impact
For European organizations using Centreon BAM, this vulnerability poses significant risks. Centreon is widely adopted in Europe, especially among enterprises and public sector entities for IT infrastructure monitoring. Successful exploitation could lead to unauthorized access to sensitive monitoring data, manipulation of business activity metrics, and disruption of operational visibility. This can impair incident response and risk management capabilities. Moreover, attackers could leverage the SQL injection to extract credentials or inject malicious payloads, facilitating lateral movement and further compromise. Given the high privileges required, insider threats or compromised administrative accounts are primary vectors, increasing the risk of insider attacks or advanced persistent threats (APTs). The impact extends to regulatory compliance, as data breaches involving monitoring data may violate GDPR and other data protection laws, leading to legal and financial penalties. The availability impact could disrupt critical monitoring services, affecting business continuity.
Mitigation Recommendations
To mitigate CVE-2024-45757, organizations should: 1) Immediately review and restrict access to Centreon BAM user-settings forms, ensuring only trusted administrators have high-privileged accounts. 2) Implement strict input validation and parameterized queries in the application code to prevent SQL injection, if possible through vendor updates or custom patches. 3) Monitor logs for unusual database queries or access patterns indicative of exploitation attempts. 4) Employ network segmentation to isolate Centreon BAM servers and limit exposure to internal threat actors. 5) Enforce multi-factor authentication (MFA) for all administrative accounts to reduce risk from compromised credentials. 6) Regularly audit user privileges and remove unnecessary high-level access. 7) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider deploying Web Application Firewalls (WAFs) with SQL injection detection rules as a temporary protective measure. 9) Conduct security awareness training focused on insider threat risks and secure credential management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbebecd
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 7/3/2025, 7:25:50 AM
Last updated: 8/10/2025, 11:56:02 AM
Views: 12
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.