Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

checkmk

About This Vendor

checkmk is a technology vendor producing software and infrastructure products. As a software provider, checkmk's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of checkmk's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 96 known vulnerabilities from checkmk. This includes 1 critical-severity issue and 35 high-severity issues that represent significant risk. These vulnerabilities affect 4 distinct products across checkmk's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2017 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying checkmk products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-14955 2017-10-02 2025-04-20 5.9 4.3 Likely
CVE-2020-24908 2021-02-19 2024-11-21 7.8 7.2 Unknown
CVE-2021-36563 2021-07-26 2024-11-21 5.4 3.5 Unknown
CVE-2020-28919 2022-01-15 2024-11-21 5.4 3.5 Unknown
CVE-2022-24564 2022-02-21 2024-11-21 6.1 4.3 Likely
CVE-2022-24565 2022-02-24 2024-11-21 5.4 3.5 Unknown
CVE-2022-24566 2022-02-24 2024-11-21 5.4 3.5 Unknown
CVE-2021-40904 2022-03-25 2024-11-21 8.8 6.8 Likely
CVE-2021-40905 2022-03-25 2024-11-21 8.8 6.8 Likely
CVE-2021-40906 2022-03-25 2024-11-21 6.1 4.3 Likely
CVE-2022-31258 2022-05-20 2024-11-21 8.2 7.2 Unknown
CVE-2022-33912 2022-06-17 2024-11-21 7.8 7.2 Unknown
CVE-2022-4884 2023-01-09 2024-11-21 3.5 - -
CVE-2023-0284 2023-01-26 2024-11-21 6.8 - -
CVE-2022-43440 2023-02-09 2024-11-21 8.8 - -
CVE-2022-46303 2023-02-20 2024-11-21 8.0 - -
CVE-2022-46836 2023-02-20 2024-11-21 9.1 - -
CVE-2022-47909 2023-02-20 2024-11-21 6.8 - -
CVE-2022-48317 2023-02-20 2024-11-21 5.6 - -
CVE-2022-48318 2023-02-20 2024-11-21 5.3 - -
CVE-2022-48319 2023-02-20 2024-11-21 6.5 - -
CVE-2022-48320 2023-02-20 2024-11-21 5.4 - -
CVE-2022-48321 2023-02-20 2024-11-21 6.8 - -
CVE-2023-22288 2023-03-20 2024-11-21 4.1 - -
CVE-2023-1768 2023-04-04 2024-11-21 3.7 - -
CVE-2023-2020 2023-04-18 2024-11-21 4.3 - -
CVE-2022-46302 2023-04-20 2024-11-21 8.8 - -
CVE-2023-31207 2023-05-02 2025-01-30 4.4 - -
CVE-2023-31208 2023-05-17 2024-11-21 8.3 - -
CVE-2023-22348 2023-05-17 2024-11-21 4.3 - -
CVE-2023-22359 2023-06-26 2024-11-21 4.3 - -
CVE-2023-23548 2023-08-01 2024-11-21 5.4 - -
CVE-2023-31209 2023-08-10 2024-11-21 8.8 - -
CVE-2023-23549 2023-11-15 2024-11-21 2.7 - -
CVE-2023-6156 2023-11-22 2024-11-21 7.6 - -
CVE-2023-6157 2023-11-22 2024-11-21 7.6 - -
CVE-2023-6251 2023-11-24 2024-11-21 3.5 - -
CVE-2023-31210 2023-12-13 2024-11-21 8.8 - -
CVE-2023-31211 2024-01-12 2024-11-21 8.8 - -
CVE-2023-6735 2024-01-12 2024-11-21 8.8 - -
CVE-2023-6740 2024-01-12 2024-11-21 8.8 - -
CVE-2024-0670 2024-03-11 2024-12-09 8.8 - -
CVE-2024-0638 2024-03-22 2024-12-04 8.2 - -
CVE-2024-1742 2024-03-22 2024-12-04 3.8 - -
CVE-2024-28824 2024-03-22 2024-12-04 8.8 - -
CVE-2024-2380 2024-04-05 2024-12-04 4.6 - -
CVE-2024-3367 2024-04-16 2024-12-05 6.5 - -
CVE-2024-28825 2024-04-24 2024-12-09 5.9 - -
CVE-2024-28826 2024-05-29 2024-12-04 8.8 - -
CVE-2024-28833 2024-06-10 2024-11-21 5.9 - -
CVE-2024-5741 2024-06-17 2024-11-21 6.5 - -
CVE-2024-28831 2024-06-25 2024-12-04 5.4 - -
CVE-2024-28832 2024-06-25 2024-12-04 4.8 - -
CVE-2024-28830 2024-06-26 2024-12-04 2.7 - -
CVE-2024-38857 2024-07-02 2024-12-04 4.3 - -
CVE-2024-6052 2024-07-03 2024-11-21 6.5 - -
CVE-2024-6163 2024-07-08 2025-08-27 5.3 - -
CVE-2024-28827 2024-07-10 2024-12-04 8.8 - -
CVE-2024-28828 2024-07-10 2024-11-21 8.8 - -
CVE-2024-6542 2024-07-22 2024-11-21 6.5 - -
CVE-2024-28829 2024-08-20 2024-12-03 7.8 - -
CVE-2024-38859 2024-08-26 2024-12-03 6.1 - -
CVE-2024-38858 2024-09-02 2024-09-04 6.1 - -
CVE-2024-6572 2024-09-09 2025-08-25 7.4 - -
CVE-2024-38860 2024-09-17 2024-12-11 6.1 - -
CVE-2024-8606 2024-09-23 2024-09-30 8.8 - -
CVE-2024-6747 2024-10-10 2024-10-15 5.3 - -
CVE-2024-38862 2024-10-14 2024-12-03 4.4 - -
CVE-2024-38863 2024-10-14 2024-12-03 7.5 - -
CVE-2024-47094 2024-11-29 2024-12-03 5.5 - -
CVE-2024-38864 2024-12-19 2025-08-25 3.3 - -
CVE-2025-1075 2025-02-19 2025-08-25 7.5 - -
CVE-2025-2596 2025-03-26 2025-08-25 5.3 - -
CVE-2024-38865 2025-04-10 2025-08-21 8.8 - -
CVE-2025-2092 2025-04-22 2025-08-25 7.5 - -
CVE-2025-3506 2025-05-08 2025-08-25 5.3 - -
CVE-2025-32917 2025-05-13 2025-08-22 8.8 - -
CVE-2025-1712 2025-05-21 2025-08-22 8.8 - -
CVE-2025-32915 2025-05-22 2025-08-26 5.5 - -
CVE-2025-32918 2025-07-04 2025-08-22 8.8 - -
CVE-2025-32916 2025-10-09 2025-12-04 4.3 - -
CVE-2025-32919 2025-10-09 2025-12-04 7.8 - -
CVE-2025-39664 2025-10-09 2025-12-04 6.5 - -
CVE-2025-39663 2025-10-30 2025-12-03 8.4 - -
CVE-2025-58121 2025-11-18 2025-11-24 5.4 - -
CVE-2025-58122 2025-11-18 2025-11-24 5.4 - -
CVE-2025-64996 2025-11-18 2025-11-24 4.4 - -
CVE-2025-64997 2025-12-18 2025-12-23 6.5 - -
CVE-2025-65000 2025-12-18 2025-12-23 5.3 - -
CVE-2025-64999 2026-02-26 2026-03-05 5.4 - -
CVE-2026-3103 2026-03-04 2026-03-05 5.4 - -
CVE-2026-24097 2026-03-13 2026-03-18 4.3 - -
CVE-2026-2859 2026-03-13 2026-03-18 4.3 - -
CVE-2026-20915 2026-03-31 2026-04-02 5.4 - -
CVE-2026-33276 2026-03-31 2026-04-02 5.4 - -
CVE-2026-24096 2026-04-01 2026-04-07 8.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for checkmk by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with checkmk's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.