The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-29895

CVE-2024-29895: Cacti Command Injection RCE Vulnerability

CVE-2024-29895 is a command injection RCE flaw in Cacti 1.3.x DEV that allows unauthenticated attackers to execute arbitrary commands when register_argc_argv is enabled. This article covers technical details, impact, and mitigations.

Updated: January 22, 2026

CVE-2024-29895 Overview

CVE-2024-29895 is a command injection vulnerability affecting Cacti, an operational monitoring and fault management framework. This vulnerability exists in the 1.3.x DEV branch and allows any unauthenticated user to execute arbitrary commands on the server when the register_argc_argv PHP configuration option is enabled.

The vulnerability resides in cmd_realtime.php at line 119, where the $poller_id variable is sourced from $_SERVER['argv'], which can be controlled via URL parameters when register_argc_argv is enabled. This configuration is enabled by default in many environments, including the main PHP Docker image, significantly increasing the attack surface.

Critical Impact

Unauthenticated remote attackers can execute arbitrary commands on vulnerable Cacti servers, potentially leading to complete system compromise, data exfiltration, and lateral movement within the network.

Affected Products

  • Cacti 1.3.x DEV branch
  • PHP environments with register_argc_argv enabled (default in PHP Docker images)
  • Cacti installations using affected versions of cmd_realtime.php

Discovery Timeline

  • 2024-05-14 - CVE-2024-29895 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2024-29895

Vulnerability Analysis

This command injection vulnerability (CWE-77) arises from the unsafe handling of user-controllable input in the cmd_realtime.php script. The core issue is that the $poller_id variable is derived from $_SERVER['argv'], a PHP superglobal that can be manipulated through URL query string parameters when the register_argc_argv PHP directive is set to On.

The vulnerability is particularly dangerous because it requires no authentication, meaning any network-accessible Cacti instance with the vulnerable configuration can be exploited by anonymous attackers. The attack can be executed entirely over the network with no user interaction required.

Root Cause

The root cause of this vulnerability is the use of unsanitized input from $_SERVER['argv'] in command execution contexts. When register_argc_argv is enabled in PHP, the query string components are parsed and made available in the $_SERVER['argv'] array. The Cacti code at line 119 of cmd_realtime.php uses this value directly as part of a system command without proper validation or sanitization.

A patch was initially applied in commit 53e8014d1f082034e0646edc6286cde3800c683d, but this fix was subsequently reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc, leaving the vulnerability unaddressed in certain code versions.

Attack Vector

The attack is network-based and requires no privileges or user interaction. An attacker can craft a malicious URL containing command injection payloads in the query string. When the Cacti server processes this request with register_argc_argv enabled, the attacker's payload is incorporated into a system command and executed with the privileges of the web server process.

Successful exploitation grants the attacker the ability to execute arbitrary shell commands, potentially allowing them to read sensitive configuration files, establish reverse shells, install malware, or pivot to other systems on the network. The scope is changed, meaning the vulnerability can impact resources beyond the vulnerable component itself.

For technical details on the vulnerable code, refer to the Cacti Command Code Review and the GitHub Security Advisory.

Detection Methods for CVE-2024-29895

Indicators of Compromise

  • Unusual HTTP requests to /cmd_realtime.php with suspicious query string parameters containing shell metacharacters (;, |, &&, backticks)
  • Web server process spawning unexpected child processes such as /bin/sh, /bin/bash, wget, curl, or nc
  • Outbound network connections from the web server to unknown external IP addresses
  • New or modified files in web-accessible directories or temporary folders
  • Web server error logs showing command execution failures or syntax errors

Detection Strategies

  • Implement web application firewall (WAF) rules to detect and block requests containing shell metacharacters in query strings to cmd_realtime.php
  • Monitor process creation events for web server processes spawning command shells or downloading tools
  • Deploy network intrusion detection system (NIDS) signatures for command injection patterns in HTTP traffic
  • Enable and centralize web access logs, filtering for requests to cmd_realtime.php with unusual parameters

Monitoring Recommendations

  • Configure SIEM alerts for command injection patterns in web application logs targeting Cacti endpoints
  • Establish baseline behavior for web server process activity and alert on anomalies
  • Monitor for unauthorized changes to Cacti configuration files and web application directories
  • Implement egress filtering and alert on unexpected outbound connections from Cacti servers

How to Mitigate CVE-2024-29895

Immediate Actions Required

  • Disable the register_argc_argv PHP configuration option by setting it to Off in php.ini
  • Restrict network access to Cacti installations to trusted IP addresses only
  • Implement WAF rules to block malicious requests to cmd_realtime.php
  • Review Cacti server logs for evidence of exploitation attempts
  • Consider temporarily disabling the cmd_realtime.php functionality if not required

Patch Information

An initial patch was committed (Cacti Commit 53e8014d) to address this vulnerability; however, this fix was subsequently reverted. Organizations should monitor the GitHub Security Advisory for updated patch information and apply fixes as soon as they become available.

Workarounds

  • Set register_argc_argv = Off in your PHP configuration (php.ini) and restart the web server
  • Use firewall rules to restrict access to Cacti to authorized administrative networks only
  • Deploy a reverse proxy or WAF in front of Cacti to filter malicious requests
  • Remove or rename cmd_realtime.php if the real-time graphing functionality is not required in your deployment
bash
# Disable register_argc_argv in PHP configuration
echo "register_argc_argv = Off" >> /etc/php/8.1/apache2/php.ini
systemctl restart apache2

# Alternatively, block access to the vulnerable endpoint using Apache
# Add to Cacti VirtualHost configuration:
# <Location "/cmd_realtime.php">
#     Require all denied
# </Location>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechCacti

  • SeverityCRITICAL

  • CVSS Score10.0

  • EPSS Probability93.22%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-77
  • Technical References
  • Cacti Command Code Review

  • Cacti Commit Update

  • Cacti Commit Update

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2024-25641: Cacti Package Import RCE Vulnerability

  • CVE-2025-24367: Cacti Graph Template RCE Vulnerability

  • CVE-2025-22604: Cacti SNMP Parser RCE Vulnerability

  • CVE-2022-46169: Cacti RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English