An issue was discovered in Opsview Monitor Agent 6.8. An unauthenticated remote attacker can call check_nrpe against affected targets, specifying known NRPE plugins, which in default installations are configured to accept command control characters and pass them to command-line interpreters for NRPE plugin execution. This allows the attacker to escape NRPE plugin execution and execute commands remotely on the target as NT_AUTHORITY\SYSTEM.
History

Fri, 10 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Opsview Monitor Agent 6.8. An unauthenticated remote attacker can call check_nrpe against affected targets, specifying known NRPE plugins, which in default installations are configured to accept command control characters and pass them to command-line interpreters for NRPE plugin execution. This allows the attacker to escape NRPE plugin execution and execute commands remotely on the target as NT_AUTHORITY\SYSTEM.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-01-09T00:00:00

Updated: 2025-01-10T17:22:15.946Z

Reserved: 2023-03-14T00:00:00

Link: CVE-2023-28354

cve-icon Vulnrichment

Updated: 2025-01-10T17:22:10.460Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-09T22:15:26.613

Modified: 2025-01-10T18:15:18.530

Link: CVE-2023-28354

cve-icon Redhat

No data.