// For flags

CVE-2021-37698

Missing TLS service certificate validation in GelfWriter, ElasticsearchWriter, InfluxdbWriter and Influxdb2Writer

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading.

Icinga es un sistema de monitorización que comprueba la disponibilidad de los recursos de red, notifica a usuarios de las interrupciones y genera datos de rendimiento para la elaboración de informes. En las versiones 2.5.0 a 2.13.0, los parámetros ElasticsearchWriter, GelfWriter, InfluxdbWriter e Influxdb2Writer no verifican el certificado del servidor a pesar de que se haya especificado una autoridad de certificación. Las instancias de Icinga 2 que se conectan a cualquiera de las bases de datos de series temporales (TSDB) mencionadas usando TLS sobre una infraestructura falsificable deben actualizar inmediatamente a versiones 2.13.1, 2.12.6 o 2.11.11 para solucionar el problema. Dichas instancias también deben cambiar las credenciales (si las presenta) usadas por la funcionalidad TSDB writer para autenticarse contra la TSDB. No se presentan soluciones aparte de la actualización.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-07-29 CVE Reserved
  • 2021-08-19 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-09-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-295: Improper Certificate Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Icinga
Search vendor "Icinga"
Icinga
Search vendor "Icinga" for product "Icinga"
>= 2.5.0 < 2.11.10
Search vendor "Icinga" for product "Icinga" and version " >= 2.5.0 < 2.11.10"
-
Affected
Icinga
Search vendor "Icinga"
Icinga
Search vendor "Icinga" for product "Icinga"
>= 2.12.0 < 2.12.6
Search vendor "Icinga" for product "Icinga" and version " >= 2.12.0 < 2.12.6"
-
Affected
Icinga
Search vendor "Icinga"
Icinga
Search vendor "Icinga" for product "Icinga"
>= 2.13.0 < 2.13.1
Search vendor "Icinga" for product "Icinga" and version " >= 2.13.0 < 2.13.1"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected