Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12519: CWE-862 Missing Authorization in Centreon Infra Monitoring

0
Medium
VulnerabilityCVE-2025-12519cvecve-2025-12519cwe-862
Published: Mon Jan 05 2026 (01/05/2026, 10:15:08 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

Missing Authorization vulnerability in Centreon Infra Monitoring (Administration parameters API endpoint modules) allows Accessing Functionality Not Properly Constrained by ACLs, resulting in Information Disclosure like downtime or acknowledgement configurations. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.

AI-Powered Analysis

AILast updated: 01/05/2026, 10:44:28 UTC

Technical Analysis

CVE-2025-12519 is a missing authorization vulnerability (CWE-862) identified in Centreon Infra Monitoring, a widely used IT infrastructure monitoring solution. The flaw exists in the Administration parameters API endpoint modules, where access control lists (ACLs) are improperly enforced or absent. This allows unauthenticated remote attackers to invoke administrative functions that should be restricted, thereby accessing sensitive information such as system downtime records and acknowledgement configurations. The vulnerability affects multiple versions: from 24.04.0 before 24.04.19, 24.10.0 before 24.10.15, and 25.10.0 before 25.10.2. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), with no impact on integrity or availability. Exploitation does not require authentication, increasing risk of unauthorized information disclosure. Although no public exploits are known, the exposure of monitoring data could aid attackers in reconnaissance and planning further attacks. Centreon Infra Monitoring is critical for operational visibility in many enterprises, making this vulnerability significant for organizations relying on it for infrastructure health and incident response.

Potential Impact

For European organizations, the primary impact is unauthorized disclosure of sensitive operational data, including downtime and acknowledgement configurations. Such information can reveal system weaknesses, maintenance schedules, or incident responses, potentially aiding attackers in timing or tailoring attacks. While the vulnerability does not directly compromise system integrity or availability, the leakage of monitoring data can undermine operational security and trust. Organizations in sectors with critical infrastructure, such as energy, telecommunications, finance, and government, may face increased risk if attackers leverage this information for targeted attacks. Additionally, compliance with data protection regulations like GDPR may be affected if sensitive operational data is exposed. The ease of remote exploitation without authentication increases the urgency for mitigation, especially in environments where Centreon Infra Monitoring APIs are exposed or accessible from untrusted networks.

Mitigation Recommendations

1. Apply official patches from Centreon immediately once available for affected versions to enforce proper authorization checks on API endpoints. 2. Restrict network access to Centreon Infra Monitoring API endpoints using firewalls, VPNs, or network segmentation to limit exposure to trusted administrators only. 3. Implement strong authentication and authorization mechanisms around the monitoring infrastructure, including multi-factor authentication for administrative access. 4. Monitor API access logs for unusual or unauthorized requests, focusing on access to administrative endpoints. 5. Conduct regular security assessments and penetration testing on monitoring systems to identify and remediate authorization weaknesses. 6. Educate IT and security teams about the risks of exposing monitoring APIs and enforce least privilege principles. 7. Consider deploying Web Application Firewalls (WAFs) or API gateways that can detect and block unauthorized access attempts to sensitive endpoints. 8. Review and harden ACL configurations within Centreon Infra Monitoring to ensure only authorized roles have access to sensitive functions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Centreon
Date Reserved
2025-10-30T15:49:52.593Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695b9291db813ff03e4708a0

Added to database: 1/5/2026, 10:29:37 AM

Last enriched: 1/5/2026, 10:44:28 AM

Last updated: 1/7/2026, 4:46:51 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats