CVE-2022-24715

8.5 HIGH

📋 TL;DR

This vulnerability allows authenticated users with configuration access in Icinga Web 2 to create SSH resource files in unintended directories, leading to remote code execution. It affects Icinga Web 2 versions before 2.8.6, 2.9.6, and 2.10. Organizations using vulnerable versions with authenticated users having configuration privileges are at risk.

💻 Affected Systems

Products:
  • Icinga Web 2
Versions: All versions before 2.8.6, 2.9.6, and 2.10
Operating Systems: Linux, Unix-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated users with configuration access privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with authenticated attackers gaining root/administrator privileges and executing arbitrary code on the server.

🟠

Likely Case

Privilege escalation leading to unauthorized access to monitoring data, system manipulation, and potential lateral movement within the network.

🟢

If Mitigated

Limited to authenticated users with configuration access only, preventing unauthenticated attacks and reducing attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available and requires authenticated access with configuration privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.6, 2.9.6, or 2.10

Vendor Advisory: https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download patched version from official Icinga repository. 3. Follow upgrade instructions for your specific version. 4. Restart Icinga Web 2 service. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict Configuration Access

all

Limit Icinga Web 2 configuration access to only essential administrators.

# Review and modify user roles in Icinga Web 2 configuration
# Remove configuration privileges from non-essential users

🧯 If You Can't Patch

  • Immediately restrict Icinga Web 2 configuration access to minimal required administrators only.
  • Implement network segmentation to isolate Icinga Web 2 from critical systems and monitor for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check Icinga Web 2 version via web interface or configuration files. Versions below 2.8.6, 2.9.6, or 2.10 are vulnerable.

Check Version:

grep 'version' /etc/icingaweb2/config.ini or check web interface About page

Verify Fix Applied:

Verify version is 2.8.6, 2.9.6, or 2.10+ and test configuration functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized SSH resource file creation
  • Unusual configuration changes by non-admin users
  • Suspicious process execution from Icinga directories

Network Indicators:

  • Unexpected outbound connections from Icinga server
  • SSH connections to unusual destinations

SIEM Query:

source="icinga*" AND (event="config_change" OR event="file_create") AND user!="admin"

🔗 References

📤 Share & Export