CVE-2025-61789: CWE-204: Observable Response Discrepancy in Icinga icingadb-web
Icinga DB Web provides a graphical interface for Icinga monitoring. Before 1.1.4 and 1.2.3, an authorized user with access to Icinga DB Web, can use a custom variable in a filter that is either protected by icingadb/protect/variables or hidden by icingadb/denylist/variables, to guess values assigned to it. Versions 1.1.4 and 1.2.3 respond with an error if such a custom variable is used.
AI Analysis
Technical Summary
CVE-2025-61789 is a vulnerability classified under CWE-204 (Observable Response Discrepancy) affecting Icinga DB Web, a graphical interface component of the Icinga monitoring system. The flaw exists in versions prior to 1.1.4 and between 1.2.0 and before 1.2.3. An authorized user with access to the Icinga DB Web interface can craft filters using custom variables that are intended to be protected or hidden via icingadb/protect/variables or icingadb/denylist/variables configurations. Due to improper handling, the system's responses differ depending on whether the guessed variable values are correct or not, allowing the attacker to infer sensitive information by analyzing these response discrepancies. This side-channel information leak compromises confidentiality but does not allow modification of data or disruption of service. The vulnerability requires low privilege (authorized user) but no additional user interaction. The issue was resolved in versions 1.1.4 and 1.2.3 by making the system respond with an error when such protected or hidden variables are queried, thus eliminating the observable discrepancy. The CVSS v3.1 score is 5.3, reflecting a medium severity with network attack vector, high attack complexity, low privileges required, no user interaction, and high confidentiality impact. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on Icinga DB Web for monitoring critical infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-61789 is the unauthorized disclosure of sensitive monitoring configuration data or custom variable values within Icinga DB Web. This information leakage could aid attackers in reconnaissance, enabling them to better understand the monitored environment and potentially plan further attacks. Confidentiality breaches may expose internal network details, system configurations, or operational parameters that are meant to be protected. Although the vulnerability does not allow direct data modification or service disruption, the leaked information could facilitate lateral movement or privilege escalation in complex attack scenarios. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive monitoring data is exposed. Since exploitation requires authorized access to the Icinga DB Web interface, the threat is more significant in environments with weak internal access controls or where user credentials may be compromised. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Upgrade Icinga DB Web to versions 1.1.4 or 1.2.3 or later, where the vulnerability is fixed. 2) Restrict access to the Icinga DB Web interface strictly to trusted and necessary personnel, enforcing strong authentication and role-based access controls to minimize the number of authorized users. 3) Monitor and audit user activities within Icinga DB Web to detect unusual filter usage or attempts to access protected variables. 4) Implement network segmentation to isolate monitoring infrastructure from general user networks, reducing the risk of unauthorized access. 5) Review and tighten the configuration of custom variables, ensuring sensitive variables are properly protected and not exposed unnecessarily. 6) Educate administrators and users about the risks of information disclosure through side channels and encourage prompt reporting of suspicious behavior. 7) Maintain up-to-date backups and incident response plans to quickly address any potential compromise stemming from information leakage. These targeted measures go beyond generic patching by focusing on access control, monitoring, and configuration hygiene specific to the vulnerability context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-61789: CWE-204: Observable Response Discrepancy in Icinga icingadb-web
Description
Icinga DB Web provides a graphical interface for Icinga monitoring. Before 1.1.4 and 1.2.3, an authorized user with access to Icinga DB Web, can use a custom variable in a filter that is either protected by icingadb/protect/variables or hidden by icingadb/denylist/variables, to guess values assigned to it. Versions 1.1.4 and 1.2.3 respond with an error if such a custom variable is used.
AI-Powered Analysis
Technical Analysis
CVE-2025-61789 is a vulnerability classified under CWE-204 (Observable Response Discrepancy) affecting Icinga DB Web, a graphical interface component of the Icinga monitoring system. The flaw exists in versions prior to 1.1.4 and between 1.2.0 and before 1.2.3. An authorized user with access to the Icinga DB Web interface can craft filters using custom variables that are intended to be protected or hidden via icingadb/protect/variables or icingadb/denylist/variables configurations. Due to improper handling, the system's responses differ depending on whether the guessed variable values are correct or not, allowing the attacker to infer sensitive information by analyzing these response discrepancies. This side-channel information leak compromises confidentiality but does not allow modification of data or disruption of service. The vulnerability requires low privilege (authorized user) but no additional user interaction. The issue was resolved in versions 1.1.4 and 1.2.3 by making the system respond with an error when such protected or hidden variables are queried, thus eliminating the observable discrepancy. The CVSS v3.1 score is 5.3, reflecting a medium severity with network attack vector, high attack complexity, low privileges required, no user interaction, and high confidentiality impact. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on Icinga DB Web for monitoring critical infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-61789 is the unauthorized disclosure of sensitive monitoring configuration data or custom variable values within Icinga DB Web. This information leakage could aid attackers in reconnaissance, enabling them to better understand the monitored environment and potentially plan further attacks. Confidentiality breaches may expose internal network details, system configurations, or operational parameters that are meant to be protected. Although the vulnerability does not allow direct data modification or service disruption, the leaked information could facilitate lateral movement or privilege escalation in complex attack scenarios. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive monitoring data is exposed. Since exploitation requires authorized access to the Icinga DB Web interface, the threat is more significant in environments with weak internal access controls or where user credentials may be compromised. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Upgrade Icinga DB Web to versions 1.1.4 or 1.2.3 or later, where the vulnerability is fixed. 2) Restrict access to the Icinga DB Web interface strictly to trusted and necessary personnel, enforcing strong authentication and role-based access controls to minimize the number of authorized users. 3) Monitor and audit user activities within Icinga DB Web to detect unusual filter usage or attempts to access protected variables. 4) Implement network segmentation to isolate monitoring infrastructure from general user networks, reducing the risk of unauthorized access. 5) Review and tighten the configuration of custom variables, ensuring sensitive variables are properly protected and not exposed unnecessarily. 6) Educate administrators and users about the risks of information disclosure through side channels and encourage prompt reporting of suspicious behavior. 7) Maintain up-to-date backups and incident response plans to quickly address any potential compromise stemming from information leakage. These targeted measures go beyond generic patching by focusing on access control, monitoring, and configuration hygiene specific to the vulnerability context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-30T19:43:49.903Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f1284b9f8a5dbaeaeb9039
Added to database: 10/16/2025, 5:15:55 PM
Last enriched: 10/16/2025, 5:29:00 PM
Last updated: 10/17/2025, 6:00:40 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-6176: Vulnerability in Red Hat Red Hat Enterprise Linux 8
MediumCVE-2023-3255: Loop with Unreachable Exit Condition ('Infinite Loop') in Red Hat Red Hat Enterprise Linux 8
MediumCVE-2023-4692: Heap-based Buffer Overflow
HighCVE-2023-24676: n/a
HighCVE-2025-62424: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MacWarrior clipbucket-v5
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.