CVE-2025-64996
EUVD-2025-19804918.11.2025, 16:15
In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| checkmk | checkmk | 𝑥 < 2.3.0 |
| checkmk | checkmk | 2.3.0 |
| checkmk | checkmk | 2.3.0:b1 |
| checkmk | checkmk | 2.3.0:b2 |
| checkmk | checkmk | 2.3.0:b3 |
| checkmk | checkmk | 2.3.0:b4 |
| checkmk | checkmk | 2.3.0:b5 |
| checkmk | checkmk | 2.3.0:b6 |
| checkmk | checkmk | 2.3.0:p1 |
| checkmk | checkmk | 2.3.0:p10 |
| checkmk | checkmk | 2.3.0:p11 |
| checkmk | checkmk | 2.3.0:p12 |
| checkmk | checkmk | 2.3.0:p13 |
| checkmk | checkmk | 2.3.0:p14 |
| checkmk | checkmk | 2.3.0:p15 |
| checkmk | checkmk | 2.3.0:p16 |
| checkmk | checkmk | 2.3.0:p17 |
| checkmk | checkmk | 2.3.0:p18 |
| checkmk | checkmk | 2.3.0:p19 |
| checkmk | checkmk | 2.3.0:p2 |
| checkmk | checkmk | 2.3.0:p20 |
| checkmk | checkmk | 2.3.0:p21 |
| checkmk | checkmk | 2.3.0:p22 |
| checkmk | checkmk | 2.3.0:p23 |
| checkmk | checkmk | 2.3.0:p24 |
| checkmk | checkmk | 2.3.0:p25 |
| checkmk | checkmk | 2.3.0:p26 |
| checkmk | checkmk | 2.3.0:p27 |
| checkmk | checkmk | 2.3.0:p28 |
| checkmk | checkmk | 2.3.0:p29 |
| checkmk | checkmk | 2.3.0:p3 |
| checkmk | checkmk | 2.3.0:p30 |
| checkmk | checkmk | 2.3.0:p31 |
| checkmk | checkmk | 2.3.0:p32 |
| checkmk | checkmk | 2.3.0:p33 |
| checkmk | checkmk | 2.3.0:p34 |
| checkmk | checkmk | 2.3.0:p35 |
| checkmk | checkmk | 2.3.0:p36 |
| checkmk | checkmk | 2.3.0:p37 |
| checkmk | checkmk | 2.3.0:p38 |
| checkmk | checkmk | 2.3.0:p39 |
| checkmk | checkmk | 2.3.0:p4 |
| checkmk | checkmk | 2.3.0:p40 |
| checkmk | checkmk | 2.3.0:p5 |
| checkmk | checkmk | 2.3.0:p6 |
| checkmk | checkmk | 2.3.0:p7 |
| checkmk | checkmk | 2.3.0:p8 |
| checkmk | checkmk | 2.3.0:p9 |
| checkmk | checkmk | 2.4.0 |
| checkmk | checkmk | 2.4.0:b1 |
| checkmk | checkmk | 2.4.0:b2 |
| checkmk | checkmk | 2.4.0:b3 |
| checkmk | checkmk | 2.4.0:b4 |
| checkmk | checkmk | 2.4.0:b5 |
| checkmk | checkmk | 2.4.0:b6 |
| checkmk | checkmk | 2.4.0:p1 |
| checkmk | checkmk | 2.4.0:p10 |
| checkmk | checkmk | 2.4.0:p11 |
| checkmk | checkmk | 2.4.0:p12 |
| checkmk | checkmk | 2.4.0:p13 |
| checkmk | checkmk | 2.4.0:p14 |
| checkmk | checkmk | 2.4.0:p15 |
| checkmk | checkmk | 2.4.0:p2 |
| checkmk | checkmk | 2.4.0:p3 |
| checkmk | checkmk | 2.4.0:p4 |
| checkmk | checkmk | 2.4.0:p5 |
| checkmk | checkmk | 2.4.0:p6 |
| checkmk | checkmk | 2.4.0:p7 |
| checkmk | checkmk | 2.4.0:p8 |
| checkmk | checkmk | 2.4.0:p9 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References