Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8432: CWE-276 Incorrect Default Permissions in Centreon Infra Monitoring

0
High
VulnerabilityCVE-2025-8432cvecve-2025-8432cwe-276
Published: Mon Oct 27 2025 (10/27/2025, 10:08:33 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

Incorrect Default Permissions vulnerability in Centreon Infra Monitoring (MBI modules) allows Embedding Scripts within Scripts by CentreonBI user account on the MBI server This issue affects Infra Monitoring: from 24.10.0 before 24.10.6, from 24.04.0 before 24.04.9, from 23.10.0 before 23.10.15.

AI-Powered Analysis

AILast updated: 10/27/2025, 10:14:36 UTC

Technical Analysis

CVE-2025-8432 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the Centreon Infra Monitoring product, specifically its MBI modules. The flaw exists in versions 23.10.0 before 23.10.15, 24.04.0 before 24.04.9, and 24.10.0 before 24.10.6. The vulnerability allows the CentreonBI user account on the MBI server to embed scripts within scripts, effectively enabling script injection or chaining that could be exploited to execute arbitrary code or escalate privileges. The vulnerability is network exploitable (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact is critical across confidentiality, integrity, and availability (C:H/I:H/A:H), indicating that exploitation could lead to full system compromise, data leakage, or service disruption. Although no known exploits are reported in the wild, the high CVSS score of 8.4 underscores the severity and potential risk. The root cause is improper default permissions assigned to the CentreonBI user account, which should have restricted capabilities but currently allows unsafe script embedding. This vulnerability highlights the importance of secure default configurations and strict permission management in monitoring infrastructure software.

Potential Impact

For European organizations, the impact of CVE-2025-8432 can be significant, especially for those relying on Centreon Infra Monitoring for critical infrastructure monitoring, IT operations, and service availability. Exploitation could allow attackers with access to the CentreonBI account to execute arbitrary scripts, potentially leading to unauthorized data access, manipulation of monitoring data, disruption of monitoring services, and lateral movement within the network. This could affect sectors such as finance, energy, telecommunications, and government agencies where Centreon is deployed. The compromise of monitoring infrastructure undermines situational awareness and incident response capabilities, increasing the risk of prolonged undetected intrusions. Additionally, the vulnerability’s requirement for user interaction and high privileges suggests insider threats or targeted attacks could be particularly effective. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity demands urgent attention to prevent exploitation.

Mitigation Recommendations

1. Apply patches from Centreon as soon as they are released for versions 23.10.x, 24.04.x, and 24.10.x to remediate the incorrect default permissions. 2. Until patches are available, audit and manually adjust permissions for the CentreonBI user account to restrict script embedding capabilities. 3. Limit the use of the CentreonBI account to trusted administrators and enforce strict access controls and multi-factor authentication. 4. Monitor logs and system behavior for unusual script execution or embedding activities on the MBI server. 5. Implement network segmentation to isolate the monitoring infrastructure from less trusted network zones. 6. Conduct regular security reviews of Centreon configurations and user privileges to ensure compliance with the principle of least privilege. 7. Educate administrators about the risks of this vulnerability and the importance of cautious handling of the CentreonBI account. 8. Employ endpoint detection and response (EDR) tools to detect potential exploitation attempts involving script execution chains.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-07-31T18:48:13.937Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ff45eabbaf5d265c824126

Added to database: 10/27/2025, 10:14:02 AM

Last enriched: 10/27/2025, 10:14:36 AM

Last updated: 10/27/2025, 11:55:33 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats