Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4048-1 | cacti security update |
Debian DSA |
DSA-5862-1 | cacti security update |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* | |
| References |
|
Mon, 27 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29. | |
| Title | Cacti has Authenticated RCE via multi-line SNMP responses | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T21:00:09.159Z
Reserved: 2025-01-07T15:07:26.775Z
Link: CVE-2025-22604
Updated: 2025-11-03T21:00:09.159Z
Status : Modified
Published: 2025-01-27T17:15:17.307
Modified: 2025-11-03T21:19:13.753
Link: CVE-2025-22604
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:19Z
Debian DLA
Debian DSA