This version specifically fixes 2 critical security issues related to MSI packaging on Windows:
CVE-2024-28240: A local user could modify the GLPI Agent configuration to gain higher privileges.
CVE-2024-28241: A local user could modify the GLPI Agent installation to gain higher privileges, but only when GLPI Agent is not installed in the default installation folder.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the links listed below in the References section.
Solution
These security issues only impact Windows installation performed with MSI packaging, so we urge you to upgrade all your agents as soon as possible if this is your case.
Preamble:A use case from one of our clients required scanning several subnets to locate all the printers to be imported into GLPI. Their infrastructure features a cloud-based Neteye Master and a Satellite within their farm. The connection between the master Read More
GLPI agents have various additional functionalities, from network discovery to remote inventory and ESX inventory. These can be controlled either directly from the command line (see my colleague’s blog https://www.neteye-blog.com/2024/07/glpi-device-discovery/ for some practical examples) or in a centralized way from Read More
GLPI agents not only perform a local inventory of the computer where they were installed, but also include several tools for discovering and inventorying other devices in their network: A network discovery task that scans an IP range (ping, arp Read More
Synopsis Important: Icinga2 security update Type/Severity Security Advisory: Critical Topic An update for the package icinga2 is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System Read More
Synopsis Important: GLPI security update Type/Severity Security Advisory: Critical Topic An update for the package glpi is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System Read More