CVE-2024-38862

Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p18, <2.2.0p35, <2.1.0p48 and <=2.0.0p39 (EOL) causes SNMP and IMPI secrets of host and folder properties to be written to audit log files accessible to administrators.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CheckmkCNA
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 19%
VendorProductVersion
checkmkcheckmk
2.0.0
checkmkcheckmk
2.1.0
checkmkcheckmk
2.1.0:b1
checkmkcheckmk
2.1.0:b2
checkmkcheckmk
2.1.0:b3
checkmkcheckmk
2.1.0:b4
checkmkcheckmk
2.1.0:b5
checkmkcheckmk
2.1.0:b6
checkmkcheckmk
2.1.0:b7
checkmkcheckmk
2.1.0:b8
checkmkcheckmk
2.1.0:b9
checkmkcheckmk
2.1.0:p1
checkmkcheckmk
2.1.0:p10
checkmkcheckmk
2.1.0:p11
checkmkcheckmk
2.1.0:p12
checkmkcheckmk
2.1.0:p13
checkmkcheckmk
2.1.0:p14
checkmkcheckmk
2.1.0:p15
checkmkcheckmk
2.1.0:p16
checkmkcheckmk
2.1.0:p17
checkmkcheckmk
2.1.0:p18
checkmkcheckmk
2.1.0:p19
checkmkcheckmk
2.1.0:p2
checkmkcheckmk
2.1.0:p20
checkmkcheckmk
2.1.0:p21
checkmkcheckmk
2.1.0:p22
checkmkcheckmk
2.1.0:p23
checkmkcheckmk
2.1.0:p24
checkmkcheckmk
2.1.0:p25
checkmkcheckmk
2.1.0:p26
checkmkcheckmk
2.1.0:p27
checkmkcheckmk
2.1.0:p28
checkmkcheckmk
2.1.0:p29
checkmkcheckmk
2.1.0:p3
checkmkcheckmk
2.1.0:p30
checkmkcheckmk
2.1.0:p31
checkmkcheckmk
2.1.0:p32
checkmkcheckmk
2.1.0:p33
checkmkcheckmk
2.1.0:p34
checkmkcheckmk
2.1.0:p35
checkmkcheckmk
2.1.0:p36
checkmkcheckmk
2.1.0:p37
checkmkcheckmk
2.1.0:p38
checkmkcheckmk
2.1.0:p39
checkmkcheckmk
2.1.0:p4
checkmkcheckmk
2.1.0:p40
checkmkcheckmk
2.1.0:p41
checkmkcheckmk
2.1.0:p42
checkmkcheckmk
2.1.0:p43
checkmkcheckmk
2.1.0:p44
checkmkcheckmk
2.1.0:p45
checkmkcheckmk
2.1.0:p46
checkmkcheckmk
2.1.0:p47
checkmkcheckmk
2.1.0:p48
checkmkcheckmk
2.1.0:p5
checkmkcheckmk
2.1.0:p6
checkmkcheckmk
2.1.0:p7
checkmkcheckmk
2.1.0:p8
checkmkcheckmk
2.1.0:p9
checkmkcheckmk
2.2.0
checkmkcheckmk
2.2.0:b1
checkmkcheckmk
2.2.0:b2
checkmkcheckmk
2.2.0:b3
checkmkcheckmk
2.2.0:b4
checkmkcheckmk
2.2.0:b5
checkmkcheckmk
2.2.0:b6
checkmkcheckmk
2.2.0:b7
checkmkcheckmk
2.2.0:b8
checkmkcheckmk
2.2.0:i1
checkmkcheckmk
2.2.0:p1
checkmkcheckmk
2.2.0:p10
checkmkcheckmk
2.2.0:p11
checkmkcheckmk
2.2.0:p12
checkmkcheckmk
2.2.0:p13
checkmkcheckmk
2.2.0:p14
checkmkcheckmk
2.2.0:p15
checkmkcheckmk
2.2.0:p16
checkmkcheckmk
2.2.0:p17
checkmkcheckmk
2.2.0:p18
checkmkcheckmk
2.2.0:p19
checkmkcheckmk
2.2.0:p2
checkmkcheckmk
2.2.0:p20
checkmkcheckmk
2.2.0:p21
checkmkcheckmk
2.2.0:p22
checkmkcheckmk
2.2.0:p23
checkmkcheckmk
2.2.0:p24
checkmkcheckmk
2.2.0:p25
checkmkcheckmk
2.2.0:p26
checkmkcheckmk
2.2.0:p27
checkmkcheckmk
2.2.0:p28
checkmkcheckmk
2.2.0:p29
checkmkcheckmk
2.2.0:p3
checkmkcheckmk
2.2.0:p30
checkmkcheckmk
2.2.0:p31
checkmkcheckmk
2.2.0:p32
checkmkcheckmk
2.2.0:p33
checkmkcheckmk
2.2.0:p34
checkmkcheckmk
2.2.0:p4
checkmkcheckmk
2.2.0:p5
checkmkcheckmk
2.2.0:p6
checkmkcheckmk
2.2.0:p7
checkmkcheckmk
2.2.0:p8
checkmkcheckmk
2.2.0:p9
checkmkcheckmk
2.3.0
checkmkcheckmk
2.3.0:b1
checkmkcheckmk
2.3.0:b2
checkmkcheckmk
2.3.0:b3
checkmkcheckmk
2.3.0:b4
checkmkcheckmk
2.3.0:b5
checkmkcheckmk
2.3.0:b6
checkmkcheckmk
2.3.0:p1
checkmkcheckmk
2.3.0:p10
checkmkcheckmk
2.3.0:p11
checkmkcheckmk
2.3.0:p12
checkmkcheckmk
2.3.0:p13
checkmkcheckmk
2.3.0:p14
checkmkcheckmk
2.3.0:p15
checkmkcheckmk
2.3.0:p16
checkmkcheckmk
2.3.0:p17
checkmkcheckmk
2.3.0:p2
checkmkcheckmk
2.3.0:p3
checkmkcheckmk
2.3.0:p4
checkmkcheckmk
2.3.0:p5
checkmkcheckmk
2.3.0:p6
checkmkcheckmk
2.3.0:p7
checkmkcheckmk
2.3.0:p8
checkmkcheckmk
2.3.0:p9
𝑥
= Vulnerable software versions