Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.
References
Link | Resource |
---|---|
https://checkmk.com/werk/17348 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Aug 2025, 14:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Checkmk checkmk
Checkmk |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://checkmk.com/werk/17348 - Vendor Advisory |
08 May 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-08 12:15
Updated : 2025-08-25 14:51
NVD link : CVE-2025-3506
Mitre link : CVE-2025-3506
CVE.ORG link : CVE-2025-3506
JSON object : View
Products Affected
checkmk
- checkmk
CWE
CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere