Skip to main content

CVE-2025-3767: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon Centreon BAM

Medium
Published: Tue Apr 22 2025 (04/22/2025, 15:16:24 UTC)
Source: CVE
Vendor/Project: Centreon
Product: Centreon BAM

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon BAM (Boolean KPi Listing modules) allows SQL Injection. This page is only accessible to authenticated users with high privileges. This issue affects Centreon BAM: from 24.10 before 24.10.1, from 24.04 before 24.04.5, from 23.10 before 23.10.10, from 23.04 before 23.04.10.

AI-Powered Analysis

AILast updated: 06/21/2025, 20:36:21 UTC

Technical Analysis

CVE-2025-3767 is a SQL Injection vulnerability identified in the Centreon BAM product, specifically within the Boolean KPI Listing modules. Centreon BAM is a business activity monitoring tool used to visualize and analyze IT infrastructure and service performance data. The vulnerability arises due to improper neutralization of special elements in SQL commands, classified under CWE-89. This means that user-supplied input is not adequately sanitized or parameterized before being incorporated into SQL queries, allowing an attacker to manipulate the query structure. Exploitation of this vulnerability could enable an authenticated user with high privileges to execute arbitrary SQL commands against the backend database. This could lead to unauthorized data access, data modification, or even deletion, compromising the confidentiality, integrity, and availability of the monitored data and potentially the monitoring system itself. The vulnerability affects multiple versions of Centreon BAM, including 23.04 (before 23.04.10), 23.10 (before 23.10.10), 24.04 (before 24.04.5), and 24.10 (before 24.10.1). Access to the vulnerable page requires authentication with elevated privileges, which limits the attack surface to insiders or attackers who have already compromised user credentials with sufficient rights. As of the publication date, no known exploits are reported in the wild, but the presence of this vulnerability in a critical monitoring tool poses a significant risk if weaponized. Centreon BAM is widely used in enterprise environments for IT service monitoring, making this vulnerability relevant for organizations relying on this product for operational visibility and incident response.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Centreon BAM is often deployed in critical infrastructure, telecommunications, finance, and government sectors to monitor IT services and business processes. Exploitation could allow attackers to extract sensitive operational data, manipulate monitoring results, or disrupt monitoring services, leading to delayed detection of incidents or misinformed decision-making. This can degrade the overall security posture and operational resilience of affected organizations. Furthermore, unauthorized database access could expose confidential business metrics or personal data, raising compliance concerns under GDPR and other data protection regulations. The requirement for high-privilege authentication reduces the likelihood of external exploitation but increases the risk from insider threats or compromised privileged accounts. Given the strategic importance of IT monitoring in maintaining service continuity, exploitation could indirectly impact availability of critical services, potentially affecting large user bases or essential public services in Europe.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize updating Centreon BAM to the fixed versions: 23.04.10, 23.10.10, 24.04.5, or 24.10.1 as applicable. If immediate patching is not feasible, restrict access to the Centreon BAM interface to trusted networks and enforce strict access controls limiting high-privilege accounts. Implement multi-factor authentication (MFA) for all privileged users to reduce the risk of credential compromise. Conduct regular audits of user privileges and monitor for unusual activity within the Centreon BAM environment. Additionally, review and harden database permissions to ensure the application account has the minimum necessary rights, limiting the impact of potential SQL injection exploitation. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable modules. Finally, enhance logging and alerting on Centreon BAM to detect anomalous queries or access patterns that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-04-17T14:36:19.597Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6de5

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 8:36:21 PM

Last updated: 7/31/2025, 6:34:57 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats