Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.
References
| Link | Resource |
|---|---|
| https://checkmk.com/werk/17348 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-05-08 12:15
Updated : 2025-08-25 14:51
NVD link : CVE-2025-3506
Mitre link : CVE-2025-3506
CVE.ORG link : CVE-2025-3506
JSON object : View
Products Affected
checkmk
- checkmk
CWE
CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
