Security News > 2025 > January > Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution
2025-01-29 10:21
A critical security flaw has been disclosed in the Cacti open-source network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE-2025-22604, carries a CVSS score of 9.1 out of a maximum of 10.0. "Due to a flaw in the multi-line SNMP result parser, authenticated users can inject
News URL
https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
Related news
- BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356) (source)
- Sophos Firewall vulnerable to critical remote code execution flaw (source)
- Sophos discloses critical Firewall remote code execution flaw (source)
- Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection (source)
- Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities (source)
- Critical security hole in Apache Struts under exploit (source)
- Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools (source)
- Apache fixes remote code execution bypass in Tomcat web server (source)
- Regulations, security, and remote work: Why network outsourcing is booming (source)
- The ongoing evolution of the CIS Critical Security Controls (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-01-27 | CVE-2025-22604 | Cacti is an open source performance and fault management framework. | 0.0 |