Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Mar/29 | Mailing List |
https://checkmk.com/werk/16361 | Vendor Advisory |
http://seclists.org/fulldisclosure/2024/Mar/29 | Mailing List |
https://checkmk.com/werk/16361 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Dec 2024, 15:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft
Checkmk Microsoft windows Checkmk checkmk |
|
CPE | cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:* |
|
References | () http://seclists.org/fulldisclosure/2024/Mar/29 - Mailing List | |
References | () https://checkmk.com/werk/16361 - Vendor Advisory |
21 Nov 2024, 08:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Mar/29 - | |
References | () https://checkmk.com/werk/16361 - |
13 Mar 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
11 Mar 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-11 15:15
Updated : 2024-12-09 15:02
NVD link : CVE-2024-0670
Mitre link : CVE-2024-0670
CVE.ORG link : CVE-2024-0670
JSON object : View
Products Affected
microsoft
- windows
checkmk
- checkmk
CWE
CWE-427
Uncontrolled Search Path Element