Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24414: CWE-276: Incorrect Default Permissions in Icinga icinga-powershell-framework

0
Medium
VulnerabilityCVE-2026-24414cvecve-2026-24414cwe-276
Published: Thu Jan 29 2026 (01/29/2026, 17:35:43 UTC)
Source: CVE Database V5
Vendor/Project: Icinga
Product: icinga-powershell-framework

Description

CVE-2026-24414 is a medium-severity vulnerability in the Icinga PowerShell Framework affecting versions prior to 1. 13. 4, 1. 12. 4, and 1. 11. 2. The issue arises from incorrect default permissions on the certificate directory, allowing every user read access to private keys used by Icinga for Windows hosts. This exposure risks unauthorized access to sensitive cryptographic material, potentially enabling impersonation or man-in-the-middle attacks. The vulnerability does not require user interaction but does require local low-privilege access.

AI-Powered Analysis

AILast updated: 01/29/2026, 18:12:25 UTC

Technical Analysis

The vulnerability identified as CVE-2026-24414 affects the Icinga PowerShell Framework, a tool used to integrate and monitor Windows environments. In affected versions prior to 1.13.4, 1.12.4, and 1.11.2, the permissions set on the 'certificate' directory within the Icinga for Windows installation are overly permissive, granting read access to all users on the system. This directory contains the private key of the Icinga certificate for the host, which is critical for secure communications and authentication within the monitoring framework. Exposure of this private key can allow an attacker with local access to the system to extract the key, potentially enabling them to impersonate the host or decrypt sensitive monitoring traffic. The vulnerability stems from CWE-276 (Incorrect Default Permissions), indicating a failure to restrict access to sensitive files appropriately. The CVSS 4.0 score of 6.8 reflects a medium severity, with the attack vector being local (AV:L), low complexity (AC:L), no privileges required beyond low-level user (PR:L), and no user interaction needed (UI:N). The impact is primarily on confidentiality (VC:H), with no direct impact on integrity or availability. The issue also affects Icinga 2 agents via a similar permissions problem (CVE-2026-24413), which is resolved by upgrading the Icinga for Windows framework. Mitigation involves upgrading to patched versions (1.13.4, 1.12.4, or 1.11.2 and later) or manually restricting ACL permissions on the certificate directories to allow access only to the Icinga service user and administrators. This ensures that private keys are not exposed to unauthorized users on the host system.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and trustworthiness of their monitoring infrastructure. Icinga is widely used for IT infrastructure monitoring, and exposure of private keys could allow attackers with local access to impersonate monitored hosts or intercept sensitive monitoring data. This could lead to undetected manipulation of monitoring results, false alerts, or suppression of alerts, impacting operational security and incident response. In critical sectors such as finance, healthcare, and energy, where monitoring integrity is paramount, exploitation could facilitate lateral movement or persistent footholds within networks. Although exploitation requires local access, insider threats or attackers who have compromised low-privilege accounts could leverage this vulnerability to escalate their capabilities. The vulnerability does not directly affect availability or integrity of the monitored systems but undermines the security of the monitoring framework itself, which is a critical component of overall cybersecurity posture.

Mitigation Recommendations

European organizations should immediately assess their use of the Icinga PowerShell Framework and Icinga 2 agents on Windows hosts. The primary mitigation is to upgrade to the fixed versions 1.13.4, 1.12.4, or 1.11.2 or later, which address the permission issues. If immediate upgrading is not feasible, administrators must manually restrict the ACL permissions on the following directories: 'C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate' and 'C:\ProgramData\icinga2\var' including all subfolders and files. Access should be limited strictly to the Icinga service user and system administrators, removing read permissions from general users. Additionally, organizations should audit local user privileges to minimize unnecessary access, implement strict endpoint security controls to prevent unauthorized local access, and monitor for suspicious access to these directories. Regularly reviewing and hardening file system permissions and applying the principle of least privilege will reduce risk. Finally, organizations should integrate this vulnerability into their patch management and vulnerability scanning processes to ensure timely detection and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-22T18:19:49.174Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697b9f9cac06320222a8a3cd

Added to database: 1/29/2026, 5:57:48 PM

Last enriched: 1/29/2026, 6:12:25 PM

Last updated: 1/29/2026, 8:18:30 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats