We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Icinga 2 is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. Prior to versions 2.12.12, 2.13.12, and 2.14.6, the VerifyCertificate() function can be tricked into incorrectly treating certificates as valid. This allows an attacker to send a malicious certificate request that is then treated as a renewal of an already existing certificate, resulting in the attacker obtaining a valid certificate that can be used to impersonate trusted nodes. This only occurs when Icinga 2 is built with OpenSSL older than version 1.1.0. This issue has been patched in versions 2.12.12, 2.13.12, and 2.14.6.
Reserved 2025-05-15 | Published 2025-05-27 | Updated 2025-05-27 | Assigner GitHub_MCWE-296: Improper Following of a Certificate's Chain of Trust
github.com/...cinga2/security/advisories/GHSA-7vcf-f5v9-3wr6
github.com/...ommit/34c93a2542bbe4e9886d15bc17ec929ead1aa152
github.com/...ommit/4023128be42b18a011dda71ddee9ca79955b89cb
github.com/...ommit/60f75f4a3d5cbb234eb3694ba7e9076a1a5b8776
github.com/...ommit/9ad5683aab9eb392c6737ff46c830a945c9e240f
github.com/...ommit/9b2c05d0cc09210bdeade77cf9a73859250fc48d
Support options