Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15026: CWE-306 Missing Authentication for Critical Function in Centreon Infra Monitoring

0
Critical
VulnerabilityCVE-2025-15026cvecve-2025-15026cwe-306
Published: Mon Jan 05 2026 (01/05/2026, 14:31:34 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

Missing Authentication for Critical Function vulnerability in Centreon Infra Monitoring centreon-awie (Awie import module) allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:11:20 UTC

Technical Analysis

CVE-2025-15026 is a critical security vulnerability identified in the Centreon Infra Monitoring software, specifically within the centreon-awie (Awie import) module. The root cause is a missing authentication mechanism for a critical function, classified under CWE-306 (Missing Authentication for Critical Function). This flaw allows unauthenticated attackers to invoke sensitive functionality that should be restricted by ACLs, effectively bypassing security controls. Affected versions include 24.04.0 before 24.04.3, 24.10.0 before 24.10.3, and 25.10.0 before 25.10.2. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature: it is remotely exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). This means an attacker can fully compromise the monitoring system, potentially gaining unauthorized access to sensitive monitoring data, altering monitoring configurations, or causing denial of service. Centreon Infra Monitoring is widely used in enterprise and critical infrastructure environments for IT and network monitoring, making this vulnerability particularly dangerous. No public exploits have been reported yet, but the vulnerability's characteristics suggest it could be weaponized quickly. The absence of authentication on a critical function is a fundamental security failure, emphasizing the need for immediate remediation.

Potential Impact

For European organizations, the impact of CVE-2025-15026 is severe. Centreon Infra Monitoring is commonly deployed in enterprises, government agencies, and critical infrastructure sectors such as energy, telecommunications, and transportation. Exploitation could allow attackers to bypass security controls, manipulate monitoring data, and disrupt operational visibility, potentially leading to undetected system failures or breaches. This can compromise incident response capabilities and increase the risk of cascading failures in critical systems. The loss of integrity and availability of monitoring data can hinder compliance with regulatory requirements such as GDPR and NIS Directive, exposing organizations to legal and financial penalties. Additionally, attackers could leverage this vulnerability as a foothold for lateral movement within networks. The criticality of this vulnerability necessitates urgent patching and enhanced monitoring to prevent exploitation and minimize operational risks.

Mitigation Recommendations

European organizations should immediately upgrade Centreon Infra Monitoring to the fixed versions: 24.04.3, 24.10.3, or 25.10.2 or later. Until patches are applied, restrict network access to the Centreon management interfaces, especially the Awie import module, using firewalls and network segmentation. Implement strict access control policies and monitor logs for unauthorized access attempts or anomalous activity related to the Awie import functionality. Employ intrusion detection/prevention systems to detect exploitation attempts targeting this vulnerability. Conduct thorough audits of Centreon configurations to ensure no legacy or default credentials exist. Consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable endpoints. Regularly review and update incident response plans to include scenarios involving monitoring system compromise. Finally, maintain close communication with Centreon support and subscribe to security advisories for timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Centreon
Date Reserved
2025-12-22T09:36:24.995Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bcf2a3dc84013b27be7ad

Added to database: 1/5/2026, 2:48:10 PM

Last enriched: 1/12/2026, 9:11:20 PM

Last updated: 2/3/2026, 12:48:48 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats