Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3884-1 | cacti security update |
EUVD |
EUVD-2024-34732 | Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue. |
Ubuntu USN |
USN-6969-1 | Cacti vulnerabilities |
Tue, 04 Nov 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Dec 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cacti
Cacti cacti Fedoraproject Fedoraproject fedora |
|
| CPEs | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cacti
Cacti cacti Fedoraproject Fedoraproject fedora |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-04T16:12:18.537Z
Reserved: 2024-05-02T06:36:32.436Z
Link: CVE-2024-34340
Updated: 2024-08-02T02:51:11.436Z
Status : Modified
Published: 2024-05-14T15:38:39.517
Modified: 2025-11-04T17:15:53.463
Link: CVE-2024-34340
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN