In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
2025-11-18T16:15:46.563
2025-11-24T14:13:26.960
Analyzed
CVSSv3.1: 4.4 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | < 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |
| Application | checkmk | checkmk | 2.4.0 | Yes |