Impact
The vulnerability allows any user on the Windows system to read the Icinga for Windows certificate directory, exposing the private key used by the service. This can lead to a confidentiality compromise, as the key may be accessed by unauthorized users.
Affected Systems
All installations of the Icinga PowerShell Framework built before version 1.13.4, 1.12.4, or 1.11.2 are vulnerable. The issue affects the certificate directory within C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework and also applies to the Icinga 2 agent directory C:\ProgramData\icinga2\var in affected releases.
Risk and Exploitability
The medium CVSS score of 6.8 reflects a moderate severity. The EPSS score of less than 1% indicates a very low likelihood of immediate exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need local user access to read the directory, making the problem primarily a privilege‑management issue (CWE‑276).
OpenCVE Enrichment