7.8
CWE
276
Advisory Published
Updated

CVE-2022-33912

First published: Fri Jun 17 2022(Updated: )

A permission issue affects users that deployed the shipped version of the Checkmk Debian package. Packages created by the agent bakery (enterprise editions only) were not affected. Using the shipped version of the agents, the maintainer scripts located at /var/lib/dpkg/info/ will be owned by the user and the group with ID 1001. If such a user exists on the system, they can change the content of these files (which are then executed by root). This leads to a local privilege escalation on the monitored host. Version 1.6 through 1.6.9p29, version 2.0 through 2.0.0p26, version 2.1 through 2.1.0p3, and version 2.2.0i1 are affected.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Checkmk NagVis=1.6.0
Checkmk NagVis=1.6.0-b1
Checkmk NagVis=1.6.0-b10
Checkmk NagVis=1.6.0-b12
Checkmk NagVis=1.6.0-b3
Checkmk NagVis=1.6.0-b4
Checkmk NagVis=1.6.0-b5
Checkmk NagVis=1.6.0-b9
Checkmk NagVis=1.6.0-p1
Checkmk NagVis=1.6.0-p10
Checkmk NagVis=1.6.0-p11
Checkmk NagVis=1.6.0-p12
Checkmk NagVis=1.6.0-p13
Checkmk NagVis=1.6.0-p14
Checkmk NagVis=1.6.0-p15
Checkmk NagVis=1.6.0-p16
Checkmk NagVis=1.6.0-p19
Checkmk NagVis=1.6.0-p2
Checkmk NagVis=1.6.0-p20
Checkmk NagVis=1.6.0-p21
Checkmk NagVis=1.6.0-p22
Checkmk NagVis=1.6.0-p23
Checkmk NagVis=1.6.0-p24
Checkmk NagVis=1.6.0-p25
Checkmk NagVis=1.6.0-p26
Checkmk NagVis=1.6.0-p27
Checkmk NagVis=1.6.0-p28
Checkmk NagVis=1.6.0-p29
Checkmk NagVis=1.6.0b10
Checkmk NagVis=1.6.0b11
Checkmk NagVis=2.0.0
Checkmk NagVis=2.0.0-b1
Checkmk NagVis=2.0.0-b2
Checkmk NagVis=2.0.0-b3
Checkmk NagVis=2.0.0-b4
Checkmk NagVis=2.0.0-b5
Checkmk NagVis=2.0.0-b6
Checkmk NagVis=2.0.0-b7
Checkmk NagVis=2.0.0-b8
Checkmk NagVis=2.0.0-p1
Checkmk NagVis=2.0.0-p10
Checkmk NagVis=2.0.0-p11
Checkmk NagVis=2.0.0-p12
Checkmk NagVis=2.0.0-p13
Checkmk NagVis=2.0.0-p14
Checkmk NagVis=2.0.0-p15
Checkmk NagVis=2.0.0-p16
Checkmk NagVis=2.0.0-p17
Checkmk NagVis=2.0.0-p18
Checkmk NagVis=2.0.0-p19
Checkmk NagVis=2.0.0-p2
Checkmk NagVis=2.0.0-p20
Checkmk NagVis=2.0.0-p21
Checkmk NagVis=2.0.0-p22
Checkmk NagVis=2.0.0-p23
Checkmk NagVis=2.0.0-p24
Checkmk NagVis=2.0.0-p25
Checkmk NagVis=2.0.0-p26
Checkmk NagVis=2.1.0-b1
Checkmk NagVis=2.1.0-b2
Checkmk NagVis=2.1.0-b3
Checkmk NagVis=2.1.0-b4
Checkmk NagVis=2.1.0-b5
Checkmk NagVis=2.1.0-b6
Checkmk NagVis=2.1.0-b7
Checkmk NagVis=2.1.0-b8
Checkmk NagVis=2.1.0-b9
Checkmk NagVis=2.1.0-p1
Checkmk NagVis=2.1.0-p2
Checkmk NagVis=2.1.0-p3
Checkmk NagVis=2.2.0-i1
Checkmk NagVis=1.6.0
Checkmk NagVis=1.6.0-b1
Checkmk NagVis=1.6.0-b10
Checkmk NagVis=1.6.0-b12
Checkmk NagVis=1.6.0-b3
Checkmk NagVis=1.6.0-b4
Checkmk NagVis=1.6.0-b5
Checkmk NagVis=1.6.0-b9
Checkmk NagVis=1.6.0-p1
Checkmk NagVis=1.6.0-p10
Checkmk NagVis=1.6.0-p11
Checkmk NagVis=1.6.0-p12
Checkmk NagVis=1.6.0-p13
Checkmk NagVis=1.6.0-p14
Checkmk NagVis=1.6.0-p15
Checkmk NagVis=1.6.0-p16
Checkmk NagVis=1.6.0-p19
Checkmk NagVis=1.6.0-p2
Checkmk NagVis=1.6.0-p20
Checkmk NagVis=1.6.0-p21
Checkmk NagVis=1.6.0-p22
Checkmk NagVis=1.6.0-p23
Checkmk NagVis=1.6.0-p24
Checkmk NagVis=1.6.0-p25
Checkmk NagVis=1.6.0-p26
Checkmk NagVis=1.6.0-p27
Checkmk NagVis=1.6.0-p28
Checkmk NagVis=1.6.0-p29
Checkmk NagVis=2.0.0
Checkmk NagVis=2.0.0-b1
Checkmk NagVis=2.0.0-b2
Checkmk NagVis=2.0.0-b3
Checkmk NagVis=2.0.0-b4
Checkmk NagVis=2.0.0-b5
Checkmk NagVis=2.0.0-b6
Checkmk NagVis=2.0.0-b7
Checkmk NagVis=2.0.0-b8
Checkmk NagVis=2.0.0-p1
Checkmk NagVis=2.0.0-p10
Checkmk NagVis=2.0.0-p11
Checkmk NagVis=2.0.0-p12
Checkmk NagVis=2.0.0-p13
Checkmk NagVis=2.0.0-p14
Checkmk NagVis=2.0.0-p15
Checkmk NagVis=2.0.0-p16
Checkmk NagVis=2.0.0-p17
Checkmk NagVis=2.0.0-p18
Checkmk NagVis=2.0.0-p19
Checkmk NagVis=2.0.0-p2
Checkmk NagVis=2.0.0-p20
Checkmk NagVis=2.0.0-p21
Checkmk NagVis=2.0.0-p22
Checkmk NagVis=2.0.0-p23
Checkmk NagVis=2.0.0-p24
Checkmk NagVis=2.0.0-p25
Checkmk NagVis=2.0.0-p26
Checkmk NagVis=2.1.0-b1
Checkmk NagVis=2.1.0-b2
Checkmk NagVis=2.1.0-b3
Checkmk NagVis=2.1.0-b4
Checkmk NagVis=2.1.0-b5
Checkmk NagVis=2.1.0-b6
Checkmk NagVis=2.1.0-b7
Checkmk NagVis=2.1.0-b8
Checkmk NagVis=2.1.0-b9
Checkmk NagVis=2.1.0-p1
Checkmk NagVis=2.1.0-p2
Checkmk NagVis=2.1.0-p3
Checkmk NagVis=2.2.0-i1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-33912?

    CVE-2022-33912 has been classified with a medium severity level.

  • How do I fix CVE-2022-33912?

    To fix CVE-2022-33912, ensure that you upgrade to a secure version of the Checkmk software that addresses the permission issues.

  • Who is affected by CVE-2022-33912?

    CVE-2022-33912 affects users who deployed the shipped version of the Checkmk Debian package.

  • What versions of Checkmk are vulnerable to CVE-2022-33912?

    CVE-2022-33912 impacts Checkmk versions 1.6.0 through subsequent revisions including 2.0.0 and 2.1.0.

  • Are Checkmk agent bakery packages affected by CVE-2022-33912?

    No, packages created by the agent bakery are not affected by CVE-2022-33912.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203