Critical (9.9)

Linux Vulnerability (CVE-2026-2749) [PoC]

CVE-2026-2749

Vulnerability in Centreon Centreon Open Tickets on Central Server on Linux (Centroen Open Ticket modules).This issue affects Centreon Open Tickets on Central Server: from all before 25.10.3, 24.10.8, ...

Affected: Linux

Overview

A critical security vulnerability has been identified in the Centreon Open Tickets module for the Central Server on Linux. This flaw affects the modules used to automatically create tickets in external IT service management (ITSM) systems. If exploited, it could allow a remote attacker to take complete control of the affected Centreon server.

Vulnerability Details

The vulnerability resides within the Centreon Open Tickets module on the Central Server. Specific versions are impacted, including all releases before 25.10.3, 24.10.8, and 24.04.7. The flaw has been assigned a maximum CVSS score of 9.9, classifying it as CRITICAL. This high score indicates the vulnerability is relatively easy for an attacker to exploit and could lead to severe consequences without requiring special privileges or user interaction.

Potential Impact

Successful exploitation of this vulnerability could have devastating effects on your IT monitoring infrastructure. An attacker could potentially:

  • Execute arbitrary code with high privileges on the Centreon Central Server.
  • Gain unauthorized access to sensitive monitoring data and credentials stored within Centreon.
  • Disrupt or disable critical IT monitoring and alerting functions.
  • Use the compromised server as a foothold to launch further attacks within your network.

Given Centreon’s role in monitoring IT infrastructure health, a breach could severely impact operational visibility and security.

Remediation and Mitigation

Immediate action is required to secure affected systems.

Primary Remediation: The only complete solution is to upgrade the Centreon Open Tickets modules to a patched version. Apply the update that corresponds to your Centreon software stream:

  • For version 25.x, upgrade to 25.10.3 or later.
  • For version 24.10.x, upgrade to 24.10.8 or later.
  • For version 24.04.x, upgrade to 24.04.7 or later.

Consult the official Centreon documentation for detailed upgrade procedures.

Temporary Mitigation: If an immediate upgrade is not possible, consider the following actions to reduce risk:

  1. Restrict Network Access: Use firewall rules to strictly limit access to the Centreon web interface and API to only trusted, necessary IP addresses (e.g., administrative networks).
  2. Review and Harden: Ensure the underlying Linux server hosting Centreon is fully patched and follows security best practices.
  3. Monitor for Compromise: Closely review Centreon server logs for any unusual activity, such as unexpected processes, network connections, or file modifications.

All users and administrators of affected versions should treat this vulnerability with high priority and plan for remediation at the earliest opportunity.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
hakaioffsec/Centreon-Exploits-2026

Centreon exploits CVE-2026-2749, CVE-2026-2751 and CVE-2026-2750

★ 9

Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Other Linux Vulnerabilities

View all Linux vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.