Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Cacti Vulnerabilities Fixed (AL01/250127/CSIRT-ITA)

Cacti Vulnerabilities Fixed (AL01/250127/CSIRT-ITA)

Summary

Updates have been released that resolve 6 vulnerabilities, including one with a “critical” severity and one with a “high” severity, in Cacti, a well-known open-source web tool that allows the visualization of graphs for monitoring networks. These vulnerabilities, if exploited, could allow a remote attacker to bypass security mechanisms, execute arbitrary code, and gain arbitrary read/write access to files on target systems.

Note: Proof of Concept (PoC) for the exploitation of all vulnerabilities are available online.

Risk

Vulnerability impact estimate on the target community: Critical (78.33)

Type

  • Remote Code Execution
  • Arbitrary File Write/Read
  • Security Restrictions Bypass

Affected products and/or versions

  • Cacti 1.2.x, versions prior to 1.2.29

Mitigation actions

It is recommended to update vulnerable products following the indications of the security bulletins reported in the References section.

CVE
CVE-2024-45598
CVE-2024-54145
CVE-2024-54146
CVE-2025-22604
CVE-2025-24367
CVE-2025-24368

References

https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36

https://github.com/Cacti/cacti/security/advisories/GHSA-fxrq-fr7h-9rqq

https://github.com/Cacti/cacti/security/advisories/GHSA-fh3x-69rr-qqpp

https://github.com/Cacti/cacti/security/advisories/GHSA-vj9g-p7f2-4wqj

https://github.com/Cacti/cacti/security/advisories/GHSA-f9c7-7rc3-574c

https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg

https://github.com/Cacti/cacti/security

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services