Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.
2023-02-20T17:15:12.453
2024-11-21T07:33:09.233
Modified
CVSSv3.1: 6.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |
| Application | checkmk | checkmk | 1.6.0 | Yes |