CVE-2024-55573
Published: 23 January 2025
Summary
CVE-2024-55573 is a critical-severity SQL Injection (CWE-89) vulnerability in Centreon Centreon Web. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires input validation mechanisms on forms like virtual metrics creation to block SQL injection payloads from high-privileged users.
Mandates timely flaw remediation by applying vendor patches to fixed Centreon versions, eliminating the SQL injection vulnerability.
Enforces least privilege to minimize users with high privileges able to access and exploit the vulnerable virtual metrics form.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in Centreon web interface directly enables remote exploitation of a public-facing application (T1190) by high-privileged users via crafted inputs to the virtual metrics form.
NVD Description
An issue was discovered in Centreon centreon-web 24.10.x before 24.10.3, 24.04.x before 24.04.9, 23.10.x before 23.10.19, 23.04.x before 23.04.24. A user with high privileges is able to inject SQL into the form used to create virtual metrics.
Deeper analysisAI
CVE-2024-55573 is a SQL injection vulnerability (CWE-89) discovered in Centreon centreon-web, affecting versions 24.10.x before 24.10.3, 24.04.x before 24.04.9, 23.10.x before 23.10.19, and 23.04.x before 23.04.24. The flaw exists in the form used to create virtual metrics, where insufficient input validation allows malicious SQL payloads to be injected.
A high-privileged user (PR:H) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Exploitation results in high impacts to confidentiality, integrity, and availability (C:I:A:H), with a changed scope (S:C), earning a CVSS v3.1 base score of 9.1.
Advisories recommend updating to the fixed versions: 24.10.3, 24.04.9, 23.10.19, or 23.04.24. Additional details on patches and mitigations are available in the Centreon security bulletin at https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-55573-centreon-web-critical-severity-4264 and GitHub releases at https://github.com/centreon/centreon/releases.
Details
- CWE(s)