Description
The Icinga PowerShell Framework provides configuration and check possibilities to ensure integration and monitoring of Windows environments. In versions prior to 1.13.4, 1.12.4, and 1.11.2, permissions of the Icinga for Windows `certificate` directory grant every user read access, which results in the exposure of private key of the Icinga certificate for the given host. All installations are affected. Versions 1.13.4, 1.12.4, and 1.11.2 contains a patch. Please note that upgrading to a fixed version of Icinga for Windows will also automatically fix a similar issue present in Icinga 2, CVE-2026-24413. As a workaround, the permissions can be restricted manually by updating the ACL for the given folder `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` (and `C:\ProgramData\icinga2\var` to fix the issue for the Icinga 2 agent as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.
Published: 2026-01-29
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Compromise due to exposure of the Icinga certificate private key
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows any user on the Windows system to read the Icinga for Windows certificate directory, exposing the private key used by the service. This can lead to a confidentiality compromise, as the key may be accessed by unauthorized users.

Affected Systems

All installations of the Icinga PowerShell Framework built before version 1.13.4, 1.12.4, or 1.11.2 are vulnerable. The issue affects the certificate directory within C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework and also applies to the Icinga 2 agent directory C:\ProgramData\icinga2\var in affected releases.

Risk and Exploitability

The medium CVSS score of 6.8 reflects a moderate severity. The EPSS score of less than 1% indicates a very low likelihood of immediate exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need local user access to read the directory, making the problem primarily a privilege‑management issue (CWE‑276).

Generated by OpenCVE AI on April 18, 2026 at 18:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Icinga for Windows to version 1.13.4, 1.12.4, or 1.11.2, a patch that corrects the ACL issue.
  • If an upgrade is not immediately feasible, manually adjust the ACL on the certificate directory C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate, adding all sub‑folders and items so that only the Icinga service user and administrators can read and write, and removing read access for all other users.
  • Apply the same ACL restrictions to the Icinga 2 agent directory C:\ProgramData\icinga2\var to prevent read access by non‑privileged users.

Generated by OpenCVE AI on April 18, 2026 at 18:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Icinga icinga Powershell Framework
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:icinga:icinga_powershell_framework:*:*:*:*:*:*:*:*
Vendors & Products Icinga icinga Powershell Framework
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Icinga
Icinga powershell-framework
Vendors & Products Icinga
Icinga powershell-framework

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 18:00:00 +0000

Type Values Removed Values Added
Description The Icinga PowerShell Framework provides configuration and check possibilities to ensure integration and monitoring of Windows environments. In versions prior to 1.13.4, 1.12.4, and 1.11.2, permissions of the Icinga for Windows `certificate` directory grant every user read access, which results in the exposure of private key of the Icinga certificate for the given host. All installations are affected. Versions 1.13.4, 1.12.4, and 1.11.2 contains a patch. Please note that upgrading to a fixed version of Icinga for Windows will also automatically fix a similar issue present in Icinga 2, CVE-2026-24413. As a workaround, the permissions can be restricted manually by updating the ACL for the given folder `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` (and `C:\ProgramData\icinga2\var` to fix the issue for the Icinga 2 agent as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.
Title Icinga for Windows certificate can have too-open permissions
Weaknesses CWE-276
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Icinga Icinga Powershell Framework Powershell-framework
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-29T21:17:16.794Z

Reserved: 2026-01-22T18:19:49.174Z

Link: CVE-2026-24414

cve-icon Vulnrichment

Updated: 2026-01-29T21:17:11.634Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T18:16:15.610

Modified: 2026-03-10T18:14:53.940

Link: CVE-2026-24414

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:45:05Z

Weaknesses