Cacti is a web-based monitoring solution and graphing tool designed to work with RRDtool.
Recently there have been reports of several Critical CVE vulnerabilities that affect Cacti version <1.2.22. These vulnerabilities range from Authentication Bypass, command injection and input validation would allow an unauthenticated user to execute arbitrary code.
This issue has already been patched but some sources report that webadmins fail to update their instance. We can make a couple of queries on Shodan or Censys to see organisation that publicly disclose their Cacti instance --> https://www.shodan.io/search?query=cacti
https://search.censys.io/search?res...sh="6c95dfa2b2e026a8eca4a7ee6da9311b2a903e7b"
This is an example of a public Cacti login page.
Sources:
https://web.archive.org/web/2023011.../cacti-unauthenticated-remote-code-execution/
https://web.archive.org/web/2023011...1/cacti-servers-under-attack-as-majority.html
Recently there have been reports of several Critical CVE vulnerabilities that affect Cacti version <1.2.22. These vulnerabilities range from Authentication Bypass, command injection and input validation would allow an unauthenticated user to execute arbitrary code.
This issue has already been patched but some sources report that webadmins fail to update their instance. We can make a couple of queries on Shodan or Censys to see organisation that publicly disclose their Cacti instance --> https://www.shodan.io/search?query=cacti
https://search.censys.io/search?res...sh="6c95dfa2b2e026a8eca4a7ee6da9311b2a903e7b"
This is an example of a public Cacti login page.
Sources:
https://web.archive.org/web/2023011.../cacti-unauthenticated-remote-code-execution/
https://web.archive.org/web/2023011...1/cacti-servers-under-attack-as-majority.html