Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23203: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Icinga icingaweb2-module-director

0
Medium
VulnerabilityCVE-2025-23203cvecve-2025-23203cwe-200cwe-284
Published: Wed Mar 26 2025 (03/26/2025, 13:44:58 UTC)
Source: CVE
Vendor/Project: Icinga
Product: icingaweb2-module-director

Description

Icinga Director is an Icinga config deployment tool. A Security vulnerability has been found starting in version 1.0.0 and prior to 1.10.4 and 1.11.4 on several director endpoints of REST API. To reproduce this vulnerability an authenticated user with permission to access the Director is required (plus api access with regard to the api endpoints). And even though some of these Icinga Director users are restricted from accessing certain objects, are able to retrieve information related to them if their name is known. This makes it possible to change the configuration of these objects by those Icinga Director users restricted from accessing them. This results in further exploitation, data breaches and sensitive information disclosure. Affected endpoints include icingaweb2/director/service, if the host name is left out of the query; icingaweb2/directore/notification; icingaweb2/director/serviceset; and icingaweb2/director/scheduled-downtime. In addition, the endpoint `icingaweb2/director/services?host=filteredHostName` returns a status code 200 even though the services for the host is filtered. This in turn lets the restricted user know that the host `filteredHostName` exists even though the user is restricted from accessing it. This could again result in further exploitation of this information and data breaches. Icinga Director has patches in versions 1.10.4 and 1.11.4. If upgrading is not feasible, disable the director module for the users other than admin role for the time being.

AI-Powered Analysis

AILast updated: 01/21/2026, 19:37:40 UTC

Technical Analysis

CVE-2025-23203 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information) and CWE-284 (Improper Access Control) found in the Icinga icingaweb2-module-director, a configuration deployment tool for Icinga monitoring. The flaw exists in several REST API endpoints where authenticated users with Director access and API permissions can bypass access restrictions. Specifically, users restricted from accessing certain configuration objects can still retrieve sensitive information about these objects if they know their names. This is due to insufficient enforcement of access controls on endpoints such as icingaweb2/director/service (when host name is omitted), notification, serviceset, and scheduled-downtime. Additionally, the services endpoint returns a 200 status code even when the queried host is filtered, revealing the existence of hosts to unauthorized users. This information leakage can enable attackers to map infrastructure, identify targets, and potentially modify configurations, escalating privileges or causing data breaches. The vulnerability affects versions from 1.0.0 up to but not including 1.10.4 and from 1.11.0 up to but not including 1.11.4. Exploitation requires authenticated users with API access, but no user interaction beyond authentication is needed. The CVSS v3.1 base score is 5.5 (medium), reflecting high confidentiality impact, low integrity impact, no availability impact, network attack vector, low attack complexity, and high privileges required. No known exploits are reported in the wild yet. Mitigation involves upgrading to patched versions 1.10.4 or 1.11.4 or restricting Director module access to admin roles only until patches can be applied.

Potential Impact

For European organizations using Icinga with the Director module, this vulnerability poses a risk of unauthorized disclosure of sensitive configuration data and infrastructure details to authenticated but unauthorized users. This can lead to information leakage that aids attackers in reconnaissance and targeted attacks, potentially resulting in configuration tampering, privilege escalation, and data breaches. Organizations relying on Icinga for critical infrastructure monitoring and configuration management may face operational risks if attackers exploit this flaw to alter monitoring configurations or suppress alerts. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure, where unauthorized access to monitoring configurations could facilitate further attacks or compliance violations. Since exploitation requires authenticated access, insider threats or compromised credentials are primary risk vectors. The vulnerability could also undermine trust in monitoring systems and complicate incident response if attackers manipulate monitoring data or schedules.

Mitigation Recommendations

1. Upgrade affected Icinga Director module versions to 1.10.4 or 1.11.4 immediately to apply official patches addressing the vulnerability. 2. Until patching is feasible, restrict access to the Director module strictly to users with admin roles; disable Director module access for all other users to prevent unauthorized API access. 3. Implement strong authentication mechanisms and enforce least privilege principles to limit the number of users with Director and API access. 4. Monitor API access logs for unusual queries or access patterns that may indicate attempts to enumerate hosts or services. 5. Conduct regular audits of user permissions within Icinga Director to ensure no unauthorized privilege escalation is possible. 6. Consider network segmentation and firewall rules to limit API endpoint exposure to trusted networks and users only. 7. Educate administrators and users about the risks of credential compromise and enforce multi-factor authentication where possible. 8. Integrate vulnerability scanning and configuration management tools to detect outdated Icinga Director versions and unauthorized configuration changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-01-13T17:15:41.050Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbebf0d

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 1/21/2026, 7:37:40 PM

Last updated: 2/7/2026, 5:18:41 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats