CVE-2025-65014

3.7 LOW

📋 TL;DR

A weak password policy vulnerability in LibreNMS allows administrators to create user accounts with extremely weak passwords like '12345678'. This exposes the platform to brute-force and credential stuffing attacks. All LibreNMS instances prior to version 25.11.0 are affected.

💻 Affected Systems

Products:
  • LibreNMS
Versions: All versions prior to 25.11.0
Operating Systems: Any OS running LibreNMS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the user management functionality where administrators can create accounts with weak passwords.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to LibreNMS, potentially compromising network monitoring data, modifying configurations, or using the system as a pivot point to attack other network devices.

🟠

Likely Case

Unauthorized users gain access to network monitoring data, potentially exposing sensitive network topology and device information.

🟢

If Mitigated

Strong password policies prevent weak password creation, limiting attack surface to other potential vulnerabilities.

🌐 Internet-Facing: HIGH if exposed to internet with weak passwords, as attackers can easily brute-force predictable credentials.
🏢 Internal Only: MEDIUM as internal attackers could still exploit weak passwords, but external attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator access to create weak passwords, but once created, brute-forcing weak passwords is trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.11.0

Vendor Advisory: https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g

Restart Required: No

Instructions:

1. Backup your LibreNMS installation and database. 2. Update LibreNMS to version 25.11.0 or later using your preferred update method (git pull, package manager, or manual update). 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Enforce Strong Password Policy

all

Manually enforce strong password requirements for all user accounts, requiring minimum length, complexity, and preventing common weak passwords.

Audit Existing User Accounts

all

Review all user accounts and force password resets for any accounts with weak or predictable passwords.

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to LibreNMS only to authorized users and systems.
  • Enable multi-factor authentication if supported, or implement IP-based access controls.

🔍 How to Verify

Check if Vulnerable:

Check LibreNMS version via web interface or by running 'grep 'version' /opt/librenms/includes/vars.php' (path may vary). If version is below 25.11.0, system is vulnerable.

Check Version:

grep 'version' /opt/librenms/includes/vars.php 2>/dev/null || echo 'Check web interface for version'

Verify Fix Applied:

After updating, verify version is 25.11.0 or higher and test that weak passwords like '12345678' are rejected during user creation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from single IP
  • Successful logins with weak password patterns
  • User account creation/modification logs

Network Indicators:

  • Brute-force login attempts to LibreNMS web interface
  • Unusual access patterns to monitoring data

SIEM Query:

source="librenms" (event_type="login_failed" AND count > 10) OR (event_type="user_created" AND password_strength="weak")

🔗 References

📤 Share & Export