Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4649: CWE-755 Improper Handling of Exceptional Conditions in Centreon web

0
Medium
VulnerabilityCVE-2025-4649cvecve-2025-4649cwe-755
Published: Tue May 13 2025 (05/13/2025, 11:40:23 UTC)
Source: CVE
Vendor/Project: Centreon
Product: web

Description

Improper Handling of Exceptional Conditions vulnerability in Centreon web allows Privilege Escalation. ACL are not correctly taken into account in the display of the "event logs" page. This page requiring, high privileges, will display all available logs. This issue affects web: from 24.10.3 before 24.10.4, from 24.04.09 before 24.04.10, from 23.10.19 before 23.10.21, from 23.04.24 before 23.04.26.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:41:38 UTC

Technical Analysis

CVE-2025-4649 is a vulnerability classified under CWE-755, indicating improper handling of exceptional conditions within the Centreon web monitoring platform. Specifically, the issue arises from incorrect enforcement of Access Control Lists (ACLs) on the 'event logs' page. This page is intended to be accessible only by users with high privileges, as it displays sensitive event logs. However, due to the flawed ACL implementation, users with lower privileges may gain unauthorized access to all available logs, effectively escalating their privileges within the system. The vulnerability affects multiple Centreon web versions: 24.10.3 before 24.10.4, 24.04.09 before 24.04.10, 23.10.19 before 23.10.21, and 23.04.24 before 23.04.26. Exploitation requires network access (AV:N) and privileges (PR:H), but no user interaction (UI:N) is needed. The scope is unchanged (S:U), and the impact primarily affects confidentiality (C:H), with no impact on integrity or availability. No public exploits are known at this time, but the vulnerability could allow attackers with some privileges to access sensitive logs, potentially revealing information useful for further attacks or reconnaissance. The vulnerability was published on May 13, 2025, and no official patches are linked in the provided data, though fixed versions are indicated by version numbers.

Potential Impact

For European organizations, especially those relying on Centreon for IT infrastructure and network monitoring, this vulnerability poses a risk of unauthorized disclosure of sensitive event logs. Such logs often contain detailed information about system events, security incidents, and operational status, which could be leveraged by attackers for lateral movement, reconnaissance, or planning further attacks. Confidentiality breaches could lead to exposure of internal security posture and vulnerabilities. Although the vulnerability does not directly affect system integrity or availability, the unauthorized access to logs undermines trust in monitoring systems and could delay incident response. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is exposed. The requirement for existing privileges limits exploitation to insiders or compromised accounts, but the ease of bypassing ACLs elevates the threat level. The absence of known exploits reduces immediate risk but does not eliminate the need for prompt remediation.

Mitigation Recommendations

European organizations should immediately verify their Centreon web versions and plan upgrades to the fixed releases: 24.10.4 or later, 24.04.10 or later, 23.10.21 or later, and 23.04.26 or later. In the absence of immediate patching, administrators should restrict access to the 'event logs' page to only the most trusted users and review user privilege assignments to minimize the number of accounts with high privileges. Implement network segmentation and firewall rules to limit access to Centreon web interfaces to authorized personnel only. Conduct thorough audits of user activity logs to detect any unauthorized access attempts. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to monitor and block anomalous requests targeting the event logs page. Regularly update and test incident response plans to handle potential data exposure scenarios. Finally, maintain close communication with Centreon for official patches and advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-05-13T09:47:58.210Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd667e

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 10/15/2025, 1:41:38 PM

Last updated: 11/22/2025, 6:05:57 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats