CVE-2026-24414

N/A Unknown

📋 TL;DR

This vulnerability exposes the private key of Icinga certificates due to overly permissive directory permissions. Any user on affected Windows systems can read the private key, potentially allowing impersonation of the Icinga service. All installations of Icinga for Windows prior to patched versions are affected.

💻 Affected Systems

Products:
  • Icinga PowerShell Framework
  • Icinga 2
Versions: Icinga for Windows versions prior to 1.13.4, 1.12.4, and 1.11.2; Icinga 2 versions with the related CVE-2026-24413
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability also affects Icinga 2 through CVE-2026-24413, which is automatically fixed when upgrading Icinga for Windows to patched versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could impersonate the Icinga service, intercept monitoring data, execute arbitrary commands with Icinga privileges, or compromise the entire monitoring infrastructure.

🟠

Likely Case

Local users or attackers with initial access could read the private key, potentially enabling lateral movement or privilege escalation within the environment.

🟢

If Mitigated

With proper access controls, only authorized service accounts can access the certificate directory, preventing unauthorized key exposure.

🌐 Internet-Facing: LOW - This requires local access to the system, though internet-facing systems could be targeted after initial compromise.
🏢 Internal Only: HIGH - Internal users or compromised accounts can easily exploit this to gain elevated privileges and access sensitive monitoring data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is trivial - any user can simply read the exposed private key file. No special tools or techniques needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Icinga for Windows 1.13.4, 1.12.4, or 1.11.2

Vendor Advisory: https://github.com/Icinga/icinga-powershell-framework/security/advisories/GHSA-88h5-rrm6-5973

Restart Required: Yes

Instructions:

1. Download the patched version from Icinga's official repository. 2. Run the Icinga for Windows installer. 3. Restart the Icinga service. 4. Verify the certificate directory permissions are now restricted.

🔧 Temporary Workarounds

Manual ACL Restriction

windows

Manually restrict permissions on the certificate directories to only allow Icinga service user and administrators access.

icacls "C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate" /inheritance:r /grant:r "NT SERVICE\icinga2: (OI)(CI)F" /grant:r "Administrators: (OI)(CI)F"
icacls "C:\ProgramData\icinga2\var" /inheritance:r /grant:r "NT SERVICE\icinga2: (OI)(CI)F" /grant:r "Administrators: (OI)(CI)F"

🧯 If You Can't Patch

  • Immediately implement the manual ACL restriction workaround on all affected systems.
  • Monitor certificate directory access attempts and review user permissions regularly.

🔍 How to Verify

Check if Vulnerable:

Check if any user can read files in C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate using 'icacls' command or by attempting to access the directory as a standard user.

Check Version:

Get-Module -Name icinga-powershell-framework -ListAvailable | Select-Object Version

Verify Fix Applied:

Verify that only the Icinga service account and administrators have read/write access to the certificate directories using 'icacls' command.

📡 Detection & Monitoring

Log Indicators:

  • Failed access attempts to certificate directories by unauthorized users
  • Unusual Icinga service account activity
  • Certificate-related errors in Icinga logs

Network Indicators:

  • Unexpected certificate validation failures
  • Suspicious connections using Icinga certificates

SIEM Query:

EventID=4663 AND ObjectName LIKE '%icinga%certificate%' AND Accesses LIKE '%ReadData%' AND NOT SubjectUserName IN ('SYSTEM', 'Administrators', 'icinga2')

🔗 References

📤 Share & Export