
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical vulnerability (CVE-2025-22604) was discovered in Cacti, an open-source performance and fault management framework. The vulnerability, disclosed on January 26, 2025, exists in the multi-line SNMP result parser where authenticated users can inject malformed OIDs in the response. This vulnerability affects all versions of Cacti up to and including version 1.2.28, with a fix available in version 1.2.29. The vulnerability has been assigned a CVSS score of 9.1 (Critical) (GitHub Advisory, NVD).
The vulnerability stems from a flaw in the multi-line SNMP result parser where OIDs are not properly filtered. When processed by ssnetsnmpdiskio() or ssnetsnmpdiskbytes() functions, a part of each OID is used as a key in an array that becomes part of a system command. The issue occurs in cactisnmpwalk() where execintoarray() executes commands and reads results with multiple lines as an array. While the values are filtered during processing, the OIDs themselves remain unfiltered, leading to potential command injection. The vulnerability is tracked as CWE-78 (Improper Neutralization of Special Elements used in an OS Command) (GitHub Advisory).
The vulnerability enables authenticated users with device management permissions to execute arbitrary code on the server. Successful exploitation could allow attackers to steal, edit, or delete sensitive data from the affected systems. The critical CVSS score of 9.1 reflects the severe potential impact on system confidentiality, integrity, and availability (Hacker News, Security Online).
The vulnerability has been patched in Cacti version 1.2.29. Organizations using affected versions are strongly urged to upgrade to the latest version immediately to mitigate the risk of exploitation. No alternative workarounds have been provided (ASEC, Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”