CWE
863 280
Advisory Published
Updated

CVE-2023-2020: Unauthorized scheduling of downtimes via REST API

First published: Tue Apr 18 2023(Updated: )

Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host.

Credit: security@checkmk.com security@checkmk.com

Affected SoftwareAffected VersionHow to fix
Tribe29 Checkmk=2.1.0
Tribe29 Checkmk=2.1.0-b1
Tribe29 Checkmk=2.1.0-b2
Tribe29 Checkmk=2.1.0-b3
Tribe29 Checkmk=2.1.0-b4
Tribe29 Checkmk=2.1.0-b5
Tribe29 Checkmk=2.1.0-b6
Tribe29 Checkmk=2.1.0-b7
Tribe29 Checkmk=2.1.0-b8
Tribe29 Checkmk=2.1.0-b9
Tribe29 Checkmk=2.1.0-p1
Tribe29 Checkmk=2.1.0-p10
Tribe29 Checkmk=2.1.0-p11
Tribe29 Checkmk=2.1.0-p12
Tribe29 Checkmk=2.1.0-p13
Tribe29 Checkmk=2.1.0-p14
Tribe29 Checkmk=2.1.0-p15
Tribe29 Checkmk=2.1.0-p16
Tribe29 Checkmk=2.1.0-p17
Tribe29 Checkmk=2.1.0-p18
Tribe29 Checkmk=2.1.0-p2
Tribe29 Checkmk=2.1.0-p20
Tribe29 Checkmk=2.1.0-p21
Tribe29 Checkmk=2.1.0-p22
Tribe29 Checkmk=2.1.0-p23
Tribe29 Checkmk=2.1.0-p24
Tribe29 Checkmk=2.1.0-p25
Tribe29 Checkmk=2.1.0-p26
Tribe29 Checkmk=2.1.0-p27
Tribe29 Checkmk=2.1.0-p3
Tribe29 Checkmk=2.1.0-p4
Tribe29 Checkmk=2.1.0-p5
Tribe29 Checkmk=2.1.0-p6
Tribe29 Checkmk=2.1.0-p7
Tribe29 Checkmk=2.1.0-p8
Tribe29 Checkmk=2.1.0-p9
Tribe29 Checkmk=2.2.0-b1
Tribe29 Checkmk=2.2.0-b2
Tribe29 Checkmk=2.2.0-b3
Tribe29 Checkmk=2.2.0-b4
Tribe29 Checkmk=2.2.0-i1
Checkmk Checkmk=2.1.0
Checkmk Checkmk=2.1.0-b1
Checkmk Checkmk=2.1.0-b2
Checkmk Checkmk=2.1.0-b3
Checkmk Checkmk=2.1.0-b4
Checkmk Checkmk=2.1.0-b5
Checkmk Checkmk=2.1.0-b6
Checkmk Checkmk=2.1.0-b7
Checkmk Checkmk=2.1.0-b8
Checkmk Checkmk=2.1.0-b9
Checkmk Checkmk=2.1.0-p1
Checkmk Checkmk=2.1.0-p10
Checkmk Checkmk=2.1.0-p11
Checkmk Checkmk=2.1.0-p12
Checkmk Checkmk=2.1.0-p13
Checkmk Checkmk=2.1.0-p14
Checkmk Checkmk=2.1.0-p15
Checkmk Checkmk=2.1.0-p16
Checkmk Checkmk=2.1.0-p17
Checkmk Checkmk=2.1.0-p18
Checkmk Checkmk=2.1.0-p2
Checkmk Checkmk=2.1.0-p20
Checkmk Checkmk=2.1.0-p21
Checkmk Checkmk=2.1.0-p22
Checkmk Checkmk=2.1.0-p23
Checkmk Checkmk=2.1.0-p24
Checkmk Checkmk=2.1.0-p25
Checkmk Checkmk=2.1.0-p26
Checkmk Checkmk=2.1.0-p27
Checkmk Checkmk=2.1.0-p3
Checkmk Checkmk=2.1.0-p4
Checkmk Checkmk=2.1.0-p5
Checkmk Checkmk=2.1.0-p6
Checkmk Checkmk=2.1.0-p7
Checkmk Checkmk=2.1.0-p8
Checkmk Checkmk=2.1.0-p9
Checkmk Checkmk=2.2.0-b1
Checkmk Checkmk=2.2.0-b2
Checkmk Checkmk=2.2.0-b3
Checkmk Checkmk=2.2.0-b4
Checkmk Checkmk=2.2.0-i1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-2020?

    CVE-2023-2020 is a vulnerability in Tribe29 Checkmk versions 2.1.0p27 and 2.2.0b4 that allows unauthorized users to schedule downtimes for any host.

  • What is the severity of CVE-2023-2020?

    The severity of CVE-2023-2020 is medium, with a severity value of 4.3.

  • How does CVE-2023-2020 affect Tribe29 Checkmk?

    CVE-2023-2020 affects Tribe29 Checkmk versions 2.1.0p27 and 2.2.0b4.

  • How can unauthorized users exploit CVE-2023-2020?

    Unauthorized users can exploit CVE-2023-2020 to schedule downtimes for any host using the REST API in Tribe29 Checkmk versions 2.1.0p27 and 2.2.0b4.

  • Is there a fix for CVE-2023-2020?

    Yes, there is a fix for CVE-2023-2020. It is recommended to update Tribe29 Checkmk to a version higher than 2.2.0b4 or 2.1.0p27.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203