Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4048-1 | cacti security update |
Debian DSA |
DSA-5862-1 | cacti security update |
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* | |
| References |
|
Mon, 27 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29. | |
| Title | Cacti has Authenticated RCE via multi-line SNMP responses | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T21:00:09.159Z
Reserved: 2025-01-07T15:07:26.775Z
Link: CVE-2025-22604
Updated: 2025-11-03T21:00:09.159Z
Status : Modified
Published: 2025-01-27T17:15:17.307
Modified: 2025-11-03T21:19:13.753
Link: CVE-2025-22604
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:19Z
Debian DLA
Debian DSA