Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.
2025-05-08T12:15:17.833
2025-08-25T14:51:47.760
Analyzed
CVSSv3.1: 5.3 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | ≤ 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |