Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-3506


Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.


Published

2025-05-08T12:15:17.833

Last Modified

2025-08-25T14:51:47.760

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-497

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application checkmk checkmk ≤ 2.3.0 Yes
Application checkmk checkmk 2.4.0 Yes
Application checkmk checkmk 2.4.0 Yes
Application checkmk checkmk 2.4.0 Yes
Application checkmk checkmk 2.4.0 Yes
Application checkmk checkmk 2.4.0 Yes
Application checkmk checkmk 2.4.0 Yes

References