CVE-2026-24414
Unknown Unknown - Not Provided
Insecure Permissions in Icinga PowerShell Framework Expose Private Keys

Publication date: 2026-01-29

Last updated on: 2026-03-10

Assigner: GitHub, Inc.

Description
The Icinga PowerShell Framework provides configuration and check possibilities to ensure integration and monitoring of Windows environments. In versions prior to 1.13.4, 1.12.4, and 1.11.2, permissions of the Icinga for Windows `certificate` directory grant every user read access, which results in the exposure of private key of the Icinga certificate for the given host. All installations are affected. Versions 1.13.4, 1.12.4, and 1.11.2 contains a patch. Please note that upgrading to a fixed version of Icinga for Windows will also automatically fix a similar issue present in Icinga 2, CVE-2026-24413. As a workaround, the permissions can be restricted manually by updating the ACL for the given folder `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` (and `C:\ProgramData\icinga2\var` to fix the issue for the Icinga 2 agent as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-29
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
icinga icinga_powershell_framework to 1.11.2 (exc)
icinga icinga_powershell_framework From 1.12.0 (inc) to 1.12.4 (exc)
icinga icinga_powershell_framework From 1.13.0 (inc) to 1.13.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a file permission issue in Icinga for Windows and Icinga 2 on Windows. The certificate directory, which contains sensitive private keys, was created with overly permissive permissions allowing all local users to read its contents. This exposure of private keys compromises the confidentiality of the system. The problem arises from incorrect default permissions set during installation, classified as CWE-276. Fixed versions restrict access to only the Icinga service user and administrators, and manual ACL updates can also mitigate the issue. [1, 2, 3]


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of private keys used by Icinga for Windows and Icinga 2, compromising the confidentiality of the host's cryptographic material. This could allow an attacker with local access to read sensitive certificate files, potentially enabling impersonation or other attacks relying on the exposed private keys. However, it does not affect the integrity or availability of the system. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the permissions of the directories `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` and `C:\ProgramData\icinga2\var` on the affected Windows system. Specifically, you should verify if these directories and their contents have overly permissive read access granted to all users. On a Windows system, you can use the command `icacls` to view the Access Control Lists (ACLs) for these directories. For example, run `icacls "C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate"` and `icacls "C:\ProgramData\icinga2\var"` to inspect the permissions. If the output shows that the 'Users' group or 'Everyone' has read access, the system is vulnerable. [1, 2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Icinga for Windows to one of the fixed versions: v1.13.4, v1.12.4, or v1.11.2, which automatically correct the permissions on the affected directories. If upgrading is not immediately possible, manually restrict the Access Control Lists (ACLs) on the directories `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` and `C:\ProgramData\icinga2\var` including all subfolders and files. The ACLs should be set to allow access only to the Icinga service user and system administrators, removing read permissions from general users. This can be done using the `icacls` command, for example: `icacls "<directory>" /inheritance:r /grant:r "IcingaServiceUser:(OI)(CI)F" "Administrators:(OI)(CI)F" /remove "Users" "Everyone" /T`. [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability exposes private keys due to overly permissive file permissions, which can lead to unauthorized access to sensitive cryptographic material. Such exposure can compromise confidentiality and potentially violate data protection requirements under standards like GDPR and HIPAA, which mandate protection of sensitive data and cryptographic keys. Therefore, this vulnerability could negatively impact compliance with these regulations by failing to adequately protect sensitive information. [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart