Skip to main content

CVE-2025-23203: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Icinga icingaweb2-module-director

Medium
VulnerabilityCVE-2025-23203cvecve-2025-23203cwe-200cwe-284
Published: Wed Mar 26 2025 (03/26/2025, 13:44:58 UTC)
Source: CVE
Vendor/Project: Icinga
Product: icingaweb2-module-director

Description

Icinga Director is an Icinga config deployment tool. A Security vulnerability has been found starting in version 1.0.0 and prior to 1.10.3 and 1.11.3 on several director endpoints of REST API. To reproduce this vulnerability an authenticated user with permission to access the Director is required (plus api access with regard to the api endpoints). And even though some of these Icinga Director users are restricted from accessing certain objects, are able to retrieve information related to them if their name is known. This makes it possible to change the configuration of these objects by those Icinga Director users restricted from accessing them. This results in further exploitation, data breaches and sensitive information disclosure. Affected endpoints include icingaweb2/director/service, if the host name is left out of the query; icingaweb2/directore/notification; icingaweb2/director/serviceset; and icingaweb2/director/scheduled-downtime. In addition, the endpoint `icingaweb2/director/services?host=filteredHostName` returns a status code 200 even though the services for the host is filtered. This in turn lets the restricted user know that the host `filteredHostName` exists even though the user is restricted from accessing it. This could again result in further exploitation of this information and data breaches. Icinga Director has patches in versions 1.10.3 and 1.11.1. If upgrading is not feasible, disable the director module for the users other than admin role for the time being.

AI-Powered Analysis

AILast updated: 06/26/2025, 01:29:58 UTC

Technical Analysis

CVE-2025-23203 is a medium-severity vulnerability affecting the Icinga Director module within icingaweb2, a widely used configuration deployment tool for the Icinga monitoring system. The vulnerability exists in versions starting from 1.0.0 up to but not including 1.10.3, and from 1.11.0 up to but not including 1.11.3. It involves improper access control on several REST API endpoints of the Director module, including endpoints such as /director/service, /director/notification, /director/serviceset, and /director/scheduled-downtime. Authenticated users with permission to access the Director and API access can exploit this flaw. Despite restrictions on certain users to access specific objects, these users can retrieve sensitive information about those objects if they know the object names. This exposure allows them to infer the existence of hosts and services they should not see, as the API returns HTTP 200 status codes even when access is filtered, effectively leaking metadata about restricted resources. This information disclosure can lead to unauthorized configuration changes, further exploitation, and data breaches. The vulnerability is rooted in CWE-200 (Exposure of Sensitive Information) and CWE-284 (Improper Access Control). The CVSS v3.1 base score is 5.5, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, no user interaction, and high confidentiality impact but limited integrity impact. Patches are available in versions 1.10.3 and 1.11.3. If upgrading is not immediately feasible, it is recommended to restrict the Director module usage to admin roles only to mitigate risk.

Potential Impact

For European organizations relying on Icinga for IT infrastructure monitoring and configuration management, this vulnerability poses a significant risk of unauthorized information disclosure and potential configuration tampering. Since Icinga Director controls deployment of monitoring configurations, unauthorized access to sensitive configuration data can reveal network topology, host details, and service configurations, which are valuable intelligence for attackers. This can facilitate lateral movement, targeted attacks, or sabotage of monitoring systems, potentially leading to undetected outages or data breaches. The fact that restricted users can confirm the existence of hosts and services they should not access increases the risk of privilege escalation and insider threats. Organizations in critical infrastructure sectors, finance, telecommunications, and government agencies in Europe that use Icinga Director could face operational disruptions and compliance violations if this vulnerability is exploited. The medium CVSS score indicates moderate risk, but the potential for further exploitation elevates the concern, especially in environments with multiple users having Director access.

Mitigation Recommendations

1. Immediate upgrade to Icinga Director versions 1.10.3 or 1.11.3 where the vulnerability is patched. 2. If upgrading is not possible immediately, restrict access to the Director module strictly to users with admin roles only, disabling it for all other users. 3. Review and tighten API access permissions to ensure that only necessary users have API access, and implement strict role-based access control (RBAC) policies. 4. Conduct an audit of current Director users and their permissions to identify and remove unnecessary privileges. 5. Monitor Director API logs for unusual access patterns or attempts to query filtered hosts/services. 6. Implement network segmentation to limit access to the Director API endpoints to trusted management networks. 7. Educate administrators and users with Director access about the risks of information leakage and the importance of credential security. 8. Consider deploying additional monitoring and alerting for configuration changes within Icinga Director to detect unauthorized modifications promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-01-13T17:15:41.050Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbebf0d

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/26/2025, 1:29:58 AM

Last updated: 8/16/2025, 9:09:38 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats