First published: Wed May 17 2023(Updated: )
Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.
Credit: security@checkmk.com security@checkmk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tribe29 Checkmk | <2.1.0 | |
Tribe29 Checkmk | =2.1.0 | |
Tribe29 Checkmk | =2.1.0-b1 | |
Tribe29 Checkmk | =2.1.0-b2 | |
Tribe29 Checkmk | =2.1.0-b3 | |
Tribe29 Checkmk | =2.1.0-b4 | |
Tribe29 Checkmk | =2.1.0-b5 | |
Tribe29 Checkmk | =2.1.0-b6 | |
Tribe29 Checkmk | =2.1.0-b7 | |
Tribe29 Checkmk | =2.1.0-b8 | |
Tribe29 Checkmk | =2.1.0-b9 | |
Tribe29 Checkmk | =2.1.0-p1 | |
Tribe29 Checkmk | =2.1.0-p10 | |
Tribe29 Checkmk | =2.1.0-p11 | |
Tribe29 Checkmk | =2.1.0-p12 | |
Tribe29 Checkmk | =2.1.0-p13 | |
Tribe29 Checkmk | =2.1.0-p14 | |
Tribe29 Checkmk | =2.1.0-p15 | |
Tribe29 Checkmk | =2.1.0-p16 | |
Tribe29 Checkmk | =2.1.0-p17 | |
Tribe29 Checkmk | =2.1.0-p18 | |
Tribe29 Checkmk | =2.1.0-p19 | |
Tribe29 Checkmk | =2.1.0-p2 | |
Tribe29 Checkmk | =2.1.0-p20 | |
Tribe29 Checkmk | =2.1.0-p21 | |
Tribe29 Checkmk | =2.1.0-p22 | |
Tribe29 Checkmk | =2.1.0-p23 | |
Tribe29 Checkmk | =2.1.0-p24 | |
Tribe29 Checkmk | =2.1.0-p25 | |
Tribe29 Checkmk | =2.1.0-p26 | |
Tribe29 Checkmk | =2.1.0-p27 | |
Tribe29 Checkmk | =2.1.0-p3 | |
Tribe29 Checkmk | =2.1.0-p4 | |
Tribe29 Checkmk | =2.1.0-p5 | |
Tribe29 Checkmk | =2.1.0-p6 | |
Tribe29 Checkmk | =2.1.0-p7 | |
Tribe29 Checkmk | =2.1.0-p8 | |
Tribe29 Checkmk | =2.1.0-p9 | |
Tribe29 Checkmk | =2.2.0-b1 | |
Tribe29 Checkmk | =2.2.0-b2 | |
Tribe29 Checkmk | =2.2.0-b3 | |
Tribe29 Checkmk | =2.2.0-b4 | |
Tribe29 Checkmk | =2.2.0-b5 | |
Tribe29 Checkmk | =2.2.0-b6 | |
Tribe29 Checkmk | =2.2.0-b7 | |
Checkmk Checkmk | =2.1.0 | |
Checkmk Checkmk | =2.1.0-b1 | |
Checkmk Checkmk | =2.1.0-b2 | |
Checkmk Checkmk | =2.1.0-b3 | |
Checkmk Checkmk | =2.1.0-b4 | |
Checkmk Checkmk | =2.1.0-b5 | |
Checkmk Checkmk | =2.1.0-b6 | |
Checkmk Checkmk | =2.1.0-b7 | |
Checkmk Checkmk | =2.1.0-b8 | |
Checkmk Checkmk | =2.1.0-b9 | |
Checkmk Checkmk | =2.1.0-p1 | |
Checkmk Checkmk | =2.1.0-p10 | |
Checkmk Checkmk | =2.1.0-p11 | |
Checkmk Checkmk | =2.1.0-p12 | |
Checkmk Checkmk | =2.1.0-p13 | |
Checkmk Checkmk | =2.1.0-p14 | |
Checkmk Checkmk | =2.1.0-p15 | |
Checkmk Checkmk | =2.1.0-p16 | |
Checkmk Checkmk | =2.1.0-p17 | |
Checkmk Checkmk | =2.1.0-p18 | |
Checkmk Checkmk | =2.1.0-p19 | |
Checkmk Checkmk | =2.1.0-p2 | |
Checkmk Checkmk | =2.1.0-p20 | |
Checkmk Checkmk | =2.1.0-p21 | |
Checkmk Checkmk | =2.1.0-p22 | |
Checkmk Checkmk | =2.1.0-p23 | |
Checkmk Checkmk | =2.1.0-p24 | |
Checkmk Checkmk | =2.1.0-p25 | |
Checkmk Checkmk | =2.1.0-p26 | |
Checkmk Checkmk | =2.1.0-p27 | |
Checkmk Checkmk | =2.1.0-p3 | |
Checkmk Checkmk | =2.1.0-p4 | |
Checkmk Checkmk | =2.1.0-p5 | |
Checkmk Checkmk | =2.1.0-p6 | |
Checkmk Checkmk | =2.1.0-p7 | |
Checkmk Checkmk | =2.1.0-p8 | |
Checkmk Checkmk | =2.1.0-p9 | |
Checkmk Checkmk | =2.2.0-b1 | |
Checkmk Checkmk | =2.2.0-b2 | |
Checkmk Checkmk | =2.2.0-b3 | |
Checkmk Checkmk | =2.2.0-b4 | |
Checkmk Checkmk | =2.2.0-b5 | |
Checkmk Checkmk | =2.2.0-b6 | |
Checkmk Checkmk | =2.2.0-b7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22348 is a vulnerability in Checkmk versions <2.1.0p28 and <2.2.0b8 that allows remote authenticated users to read arbitrary host_configs.
CVE-2023-22348 has a severity level of medium (4.3).
CVE-2023-22348 affects Checkmk versions <2.1.0p28 and <2.2.0b8.
To fix CVE-2023-22348, update Checkmk to version 2.1.0p28 or 2.2.0b8 or later.
You can find more information about CVE-2023-22348 at the official Checkmk website.