{"vulnerability": "CVE-2024-49369", "sightings": [{"uuid": "bd478272-da71-4dc0-80af-e8828a617fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49369", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113471023692988977", "content": "", "creation_timestamp": "2024-11-12T16:53:35.776670Z"}, {"uuid": "df7b04ff-7dbe-404d-b322-c62fcca27a96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49369", "type": "seen", "source": "https://t.me/cvedetector/10668", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49369 - Icinga 2 TLS Certificate Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-49369 \nPublished : Nov. 12, 2024, 5:15 p.m. | 33\u00a0minutes ago \nDescription : Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T18:53:52.000000Z"}]}