Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2750: CWE-20 Improper Input Validation in Centreon Centreon Open Tickets on Central Server

0
Critical
VulnerabilityCVE-2026-2750cvecve-2026-2750cwe-20
Published: Fri Feb 27 2026 (02/27/2026, 14:58:29 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Centreon Open Tickets on Central Server

Description

Improper Input Validation vulnerability in Centreon Centreon Open Tickets on Central Server on Linux (Centreon Open Tickets modules).This issue affects Centreon Open Tickets on Central Server: from all before 25.10; 24.10;24.04.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:43:37 UTC

Technical Analysis

CVE-2026-2750 is a critical security vulnerability classified under CWE-20 (Improper Input Validation) affecting the Centreon Open Tickets module on Central Server running on Linux. Centreon is a widely used IT infrastructure monitoring and ticketing solution. The vulnerability impacts all versions before 25.10, including 24.10 and 24.04. Improper input validation means that the software fails to correctly verify or sanitize input data, which can be manipulated by an attacker. The CVSS 3.1 base score is 9.1, reflecting a network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), with a scope change (S:C), and high impacts on confidentiality (C:H), integrity (I:H), and availability (A:H). This indicates that an attacker with high privileges on the network can exploit this vulnerability to execute unauthorized commands, escalate privileges, or disrupt services, potentially compromising the entire system and connected infrastructure. Although no public exploits are currently reported, the severity and nature of the flaw make it a critical risk for organizations relying on Centreon for operational monitoring and ticket management. The vulnerability likely resides in how the Open Tickets module processes input data, possibly allowing crafted inputs to bypass security checks or trigger unintended behavior. The lack of available patches at the time of publication necessitates immediate attention to mitigating controls.

Potential Impact

The impact of CVE-2026-2750 is severe for organizations using Centreon Open Tickets on Central Server. Exploitation can lead to full compromise of the monitoring and ticketing system, which is often integral to IT operations and incident response workflows. Confidentiality breaches could expose sensitive operational data and internal communications. Integrity violations may allow attackers to alter ticket data, masking malicious activities or causing erroneous incident handling. Availability impacts could disrupt monitoring and alerting functions, delaying detection and response to other security incidents. Given Centreon's role in critical infrastructure monitoring, successful exploitation could cascade into broader operational disruptions. Organizations in sectors such as finance, healthcare, energy, and government, which rely heavily on continuous monitoring, face heightened risks. The requirement for high privileges to exploit the vulnerability somewhat limits the attack surface but does not eliminate risk, especially in environments where insider threats or lateral movement are possible.

Mitigation Recommendations

Until official patches are released, organizations should implement strict network segmentation to isolate Centreon servers from untrusted networks and limit access to trusted administrators only. Enforce the principle of least privilege rigorously to reduce the number of users with high privileges capable of exploiting this vulnerability. Monitor logs and network traffic for unusual activity related to Centreon Open Tickets modules. Employ application-layer firewalls or intrusion prevention systems to detect and block anomalous inputs targeting the affected components. Regularly audit user accounts and permissions on Centreon servers. Prepare to apply vendor patches immediately upon release and test them in controlled environments before deployment. Additionally, consider deploying endpoint detection and response (EDR) solutions to detect potential exploitation attempts. Maintain up-to-date backups of Centreon configurations and data to enable rapid recovery if availability is impacted.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Centreon
Date Reserved
2026-02-19T14:25:18.453Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1b7a632ffcdb8a23ccfc2

Added to database: 2/27/2026, 3:26:30 PM

Last enriched: 3/6/2026, 8:43:37 PM

Last updated: 4/13/2026, 10:01:30 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses