Changeflow GovPing Data Privacy & Cybersecurity LibreNMS Vulnerability Allows Remote Code Execu...
Priority review Notice Added Final

LibreNMS Vulnerability Allows Remote Code Execution

Favicon for www.cert.ssi.gouv.fr CERT-FR Security Advisories
Published March 24th, 2026
Detected March 24th, 2026
Email

Summary

CERT-FR has issued an advisory regarding a critical vulnerability in LibreNMS versions prior to 26.3.0. This vulnerability allows for remote code execution and data integrity compromise. Users are advised to consult the LibreNMS security bulletin for patch information.

What changed

CERT-FR, the French national cybersecurity agency, has issued an advisory (CERTFR-2026-AVI-0345) detailing a critical vulnerability discovered in LibreNMS software, specifically affecting versions prior to 26.3.0. The vulnerability poses significant risks, including the potential for arbitrary remote code execution and data integrity breaches. This advisory highlights the need for immediate attention from organizations utilizing this network monitoring system.

Organizations using LibreNMS versions prior to 26.3.0 are strongly urged to apply the necessary patches or updates as outlined in the official LibreNMS security bulletin (GHSA-pr3g-phhr-h8fh). Failure to address this vulnerability could lead to unauthorized access, system compromise, and potential data loss or manipulation. While no specific compliance deadline is stated, prompt remediation is critical to mitigate security risks.

What to do next

  1. Update LibreNMS to version 26.3.0 or later.
  2. Consult the LibreNMS security bulletin GHSA-pr3g-phhr-h8fh for detailed patching instructions.

Source document (simplified)

Premier Ministre S.G.D.S.N

Agence nationale
de la sécurité des
systèmes d'information

Paris, le 24 mars 2026 N° CERTFR-2026-AVI-0345 Affaire suivie par: CERT-FR

Avis du CERT-FR

Objet: Vulnérabilité dans LibreNMS

Gestion du document

| Référence | CERTFR-2026-AVI-0345 |
| Titre | Vulnérabilité dans LibreNMS |
| Date de la première version | 24 mars 2026 |
| Date de la dernière version | 24 mars 2026 |
| Source(s) | Bulletin de sécurité LibreNMS GHSA-pr3g-phhr-h8fh du 24 mars 2026 |
Une gestion de version détaillée se trouve à la fin de ce document.


Risques

  • Atteinte à l'intégrité des données
  • Exécution de code arbitraire à distance

Systèmes affectés

  • LibreNMS versions antérieures à 26.3.0 pour composer

Résumé

Une vulnérabilité a été découverte dans LibreNMS. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Documentation


Gestion détaillée du document

  1. le 24 mars 2026 Version initiale

Named provisions

Risks Affected Systems Summary Solutions Documentation

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-FR
Published
March 24th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
CERTFR-2026-AVI-0345

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability Management System Security
Geographic scope
France FR

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Vulnerability Management Remote Code Execution

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-FR Security Advisories publishes new changes.

Free. Unsubscribe anytime.