CVE-2025-3506
08.05.2025, 12:15
Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.Enginsight
Vendor | Product | Version |
---|---|---|
checkmk | checkmk | 2.1.0 ≤ 𝑥 ≤ 2.3.0 |
checkmk | checkmk | 2.4.0 |
checkmk | checkmk | 2.4.0:b1 |
checkmk | checkmk | 2.4.0:b2 |
checkmk | checkmk | 2.4.0:b3 |
checkmk | checkmk | 2.4.0:b4 |
checkmk | checkmk | 2.4.0:b5 |
𝑥
= Vulnerable software versions
References