Certain http endpoints of Checkmk in Checkmk < 2.3.0p10 < 2.2.0p31, < 2.1.0p46, <= 2.0.0p39 allows remote attacker to bypass authentication and access data
2024-07-08T13:15:10.593
2025-08-27T22:15:50.967
Modified
CVSSv3.1: 5.3 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | ≤ 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |