CVE-2025-32919
09.10.2025, 15:16
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).Enginsight
| Vendor | Product | Version |
|---|---|---|
| checkmk | checkmk | 2.1.0 ≤ 𝑥 < 2.2.0 |
| checkmk | checkmk | 2.2.0 |
| checkmk | checkmk | 2.2.0:p1 |
| checkmk | checkmk | 2.2.0:p10 |
| checkmk | checkmk | 2.2.0:p11 |
| checkmk | checkmk | 2.2.0:p12 |
| checkmk | checkmk | 2.2.0:p13 |
| checkmk | checkmk | 2.2.0:p14 |
| checkmk | checkmk | 2.2.0:p16 |
| checkmk | checkmk | 2.2.0:p17 |
| checkmk | checkmk | 2.2.0:p18 |
| checkmk | checkmk | 2.2.0:p19 |
| checkmk | checkmk | 2.2.0:p21 |
| checkmk | checkmk | 2.2.0:p22 |
| checkmk | checkmk | 2.2.0:p23 |
| checkmk | checkmk | 2.2.0:p24 |
| checkmk | checkmk | 2.2.0:p25 |
| checkmk | checkmk | 2.2.0:p26 |
| checkmk | checkmk | 2.2.0:p27 |
| checkmk | checkmk | 2.2.0:p28 |
| checkmk | checkmk | 2.2.0:p29 |
| checkmk | checkmk | 2.2.0:p3 |
| checkmk | checkmk | 2.2.0:p30 |
| checkmk | checkmk | 2.2.0:p31 |
| checkmk | checkmk | 2.2.0:p32 |
| checkmk | checkmk | 2.2.0:p33 |
| checkmk | checkmk | 2.2.0:p34 |
| checkmk | checkmk | 2.2.0:p35 |
| checkmk | checkmk | 2.2.0:p36 |
| checkmk | checkmk | 2.2.0:p37 |
| checkmk | checkmk | 2.2.0:p38 |
| checkmk | checkmk | 2.2.0:p39 |
| checkmk | checkmk | 2.2.0:p4 |
| checkmk | checkmk | 2.2.0:p40 |
| checkmk | checkmk | 2.2.0:p41 |
| checkmk | checkmk | 2.2.0:p42 |
| checkmk | checkmk | 2.2.0:p43 |
| checkmk | checkmk | 2.2.0:p44 |
| checkmk | checkmk | 2.2.0:p45 |
| checkmk | checkmk | 2.2.0:p5 |
| checkmk | checkmk | 2.2.0:p6 |
| checkmk | checkmk | 2.2.0:p7 |
| checkmk | checkmk | 2.2.0:p8 |
| checkmk | checkmk | 2.2.0:p9 |
| checkmk | checkmk | 2.3.0 |
| checkmk | checkmk | 2.3.0:p1 |
| checkmk | checkmk | 2.3.0:p10 |
| checkmk | checkmk | 2.3.0:p11 |
| checkmk | checkmk | 2.3.0:p12 |
| checkmk | checkmk | 2.3.0:p13 |
| checkmk | checkmk | 2.3.0:p14 |
| checkmk | checkmk | 2.3.0:p15 |
| checkmk | checkmk | 2.3.0:p16 |
| checkmk | checkmk | 2.3.0:p17 |
| checkmk | checkmk | 2.3.0:p18 |
| checkmk | checkmk | 2.3.0:p19 |
| checkmk | checkmk | 2.3.0:p2 |
| checkmk | checkmk | 2.3.0:p20 |
| checkmk | checkmk | 2.3.0:p21 |
| checkmk | checkmk | 2.3.0:p22 |
| checkmk | checkmk | 2.3.0:p23 |
| checkmk | checkmk | 2.3.0:p24 |
| checkmk | checkmk | 2.3.0:p25 |
| checkmk | checkmk | 2.3.0:p26 |
| checkmk | checkmk | 2.3.0:p27 |
| checkmk | checkmk | 2.3.0:p28 |
| checkmk | checkmk | 2.3.0:p29 |
| checkmk | checkmk | 2.3.0:p3 |
| checkmk | checkmk | 2.3.0:p30 |
| checkmk | checkmk | 2.3.0:p31 |
| checkmk | checkmk | 2.3.0:p32 |
| checkmk | checkmk | 2.3.0:p33 |
| checkmk | checkmk | 2.3.0:p34 |
| checkmk | checkmk | 2.3.0:p35 |
| checkmk | checkmk | 2.3.0:p36 |
| checkmk | checkmk | 2.3.0:p37 |
| checkmk | checkmk | 2.3.0:p4 |
| checkmk | checkmk | 2.3.0:p5 |
| checkmk | checkmk | 2.3.0:p6 |
| checkmk | checkmk | 2.3.0:p7 |
| checkmk | checkmk | 2.3.0:p8 |
| checkmk | checkmk | 2.3.0:p9 |
| checkmk | checkmk | 2.4.0 |
| checkmk | checkmk | 2.4.0:p1 |
| checkmk | checkmk | 2.4.0:p10 |
| checkmk | checkmk | 2.4.0:p11 |
| checkmk | checkmk | 2.4.0:p12 |
| checkmk | checkmk | 2.4.0:p2 |
| checkmk | checkmk | 2.4.0:p3 |
| checkmk | checkmk | 2.4.0:p4 |
| checkmk | checkmk | 2.4.0:p5 |
| checkmk | checkmk | 2.4.0:p6 |
| checkmk | checkmk | 2.4.0:p7 |
| checkmk | checkmk | 2.4.0:p8 |
| checkmk | checkmk | 2.4.0:p9 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration