An update for httpd is now available for NetEye 4.17.
NetEye Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating.
Description
httpd is the Apache HyperText Transfer Protocol (HTTP) server program used in the NetEye 4 Product to expose the web interface.
A lack of some headers useful to prevent cross-site request forgery and clickjacking attacks was found in the configuration. Attackers were able to induce users to perform actions that they do not intend to perform.
Security Fix(es) for NetEye 4.17:
httpd-neteye-config-1.9.1-1.noarch.rpm
httpd-neteye-config-autosetup-1.9.1-1.noarch.rpm
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the links listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to the NetEye Update Section inside the User Guide.
After installing the updated packages, the httpd daemon will be restarted automatically.
Affected Products
All NetEye 4.x versions prior to and including 4.17.
Fix NagVis navigation using IcingaDB Web URLs When clicking on a host or service from a NagVis map, you were redirected to the legacy Monitoring module. The links have been updated to correctly point to the IcingaDB Web module. List Read More
Fixing Misplaced Plugin Output in Icinga Web Interface When plugin output contained HTML content (like links), it was incorrectly displayed near the service name instead of in the Plugin Output section. The plugin output section now correctly renders all content. Read More
Icinga Director Now Responsive During Configuration Deployments Previously, users were unable to interact with Icinga Director while configuration deployments were running. Any attempt to access the interface or API would be blocked until the deployment completed, causing unnecessary delays in Read More
Important: Grafana security update Type/Severity NetEye Product Security has rated this update as having a high security impact. Topic An update for the Grafana packages is now available for NetEye 4. Security Fix for NetEye 4.46 12.0.9_neteye3.29.1-1 CVEs CVE-2026-21720CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H The CVE is about Read More
Important: GLPI security update Type/Severity NetEye Product Security has rated this update as having a high security impact. Topic An update for the GLPI packages is now available for NetEye 4. Security Fix for NetEye 4.46 10.0.23_neteye1.17.5-1 CVEs CVE-2026-22044CVSS:Reserved CVE-2026-23624CVSS:Reserved The CVEs include Read More