The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade icinga/icinga2
to version 2.12.12, 2.13.12, 2.14.6 or higher.
Affected versions of this package are vulnerable to Improper Following of a Certificate's Chain of Trust via the VerifyCertificate
function. An attacker can send a malicious certificate request that is then treated as a renewal of an already existing certificate, resulting in the attacker obtaining a valid certificate that can be used to impersonate trusted nodes.
Note: This is only applicable if Icinga 2 is built with OpenSSL older than version 1.1.0, which can be checked by running icinga2 --version | grep OpenSSL
; Additionally, a direct TLS connection to a master capable of signing certificates is required. On other nodes, it only results in an incorrect "Received certificate request for CN '[...]' signed by our CA."