
24/4/2024

9/12/2024
CVE-2024-28825: Brute-force protection ineffective for some login methods
First published: Wed Apr 24 2024(Updated: )
Improper restriction of excessive authentication attempts on some authentication methods in Checkmk before 2.3.0b5 (beta), 2.2.0p26, 2.1.0p43, and in Checkmk 2.0.0 (EOL) facilitates password brute-forcing.
Credit: security@checkmk.com
Affected Software | Affected Version | How to fix |
---|
Checkmk NagVis | <=2.0.0 | |
Checkmk NagVis | =2.1.0 | |
Checkmk NagVis | =2.1.0-b1 | |
Checkmk NagVis | =2.1.0-b2 | |
Checkmk NagVis | =2.1.0-b3 | |
Checkmk NagVis | =2.1.0-b4 | |
Checkmk NagVis | =2.1.0-b5 | |
Checkmk NagVis | =2.1.0-b6 | |
Checkmk NagVis | =2.1.0-b7 | |
Checkmk NagVis | =2.1.0-b8 | |
Checkmk NagVis | =2.1.0-b9 | |
Checkmk NagVis | =2.1.0-p1 | |
Checkmk NagVis | =2.1.0-p10 | |
Checkmk NagVis | =2.1.0-p11 | |
Checkmk NagVis | =2.1.0-p12 | |
Checkmk NagVis | =2.1.0-p13 | |
Checkmk NagVis | =2.1.0-p14 | |
Checkmk NagVis | =2.1.0-p15 | |
Checkmk NagVis | =2.1.0-p16 | |
Checkmk NagVis | =2.1.0-p17 | |
Checkmk NagVis | =2.1.0-p18 | |
Checkmk NagVis | =2.1.0-p19 | |
Checkmk NagVis | =2.1.0-p2 | |
Checkmk NagVis | =2.1.0-p20 | |
Checkmk NagVis | =2.1.0-p21 | |
Checkmk NagVis | =2.1.0-p22 | |
Checkmk NagVis | =2.1.0-p23 | |
Checkmk NagVis | =2.1.0-p24 | |
Checkmk NagVis | =2.1.0-p25 | |
Checkmk NagVis | =2.1.0-p26 | |
Checkmk NagVis | =2.1.0-p27 | |
Checkmk NagVis | =2.1.0-p28 | |
Checkmk NagVis | =2.1.0-p29 | |
Checkmk NagVis | =2.1.0-p3 | |
Checkmk NagVis | =2.1.0-p30 | |
Checkmk NagVis | =2.1.0-p31 | |
Checkmk NagVis | =2.1.0-p32 | |
Checkmk NagVis | =2.1.0-p33 | |
Checkmk NagVis | =2.1.0-p34 | |
Checkmk NagVis | =2.1.0-p35 | |
Checkmk NagVis | =2.1.0-p36 | |
Checkmk NagVis | =2.1.0-p37 | |
Checkmk NagVis | =2.1.0-p38 | |
Checkmk NagVis | =2.1.0-p39 | |
Checkmk NagVis | =2.1.0-p4 | |
Checkmk NagVis | =2.1.0-p40 | |
Checkmk NagVis | =2.1.0-p41 | |
Checkmk NagVis | =2.1.0-p42 | |
Checkmk NagVis | =2.1.0-p5 | |
Checkmk NagVis | =2.1.0-p6 | |
Checkmk NagVis | =2.1.0-p7 | |
Checkmk NagVis | =2.1.0-p8 | |
Checkmk NagVis | =2.1.0-p9 | |
Checkmk NagVis | =2.2.0 | |
Checkmk NagVis | =2.2.0-b1 | |
Checkmk NagVis | =2.2.0-b2 | |
Checkmk NagVis | =2.2.0-b3 | |
Checkmk NagVis | =2.2.0-b4 | |
Checkmk NagVis | =2.2.0-b5 | |
Checkmk NagVis | =2.2.0-b6 | |
Checkmk NagVis | =2.2.0-b7 | |
Checkmk NagVis | =2.2.0-b8 | |
Checkmk NagVis | =2.2.0-i1 | |
Checkmk NagVis | =2.2.0-p1 | |
Checkmk NagVis | =2.2.0-p10 | |
Checkmk NagVis | =2.2.0-p11 | |
Checkmk NagVis | =2.2.0-p12 | |
Checkmk NagVis | =2.2.0-p13 | |
Checkmk NagVis | =2.2.0-p14 | |
Checkmk NagVis | =2.2.0-p15 | |
Checkmk NagVis | =2.2.0-p16 | |
Checkmk NagVis | =2.2.0-p17 | |
Checkmk NagVis | =2.2.0-p18 | |
Checkmk NagVis | =2.2.0-p19 | |
Checkmk NagVis | =2.2.0-p2 | |
Checkmk NagVis | =2.2.0-p20 | |
Checkmk NagVis | =2.2.0-p21 | |
Checkmk NagVis | =2.2.0-p22 | |
Checkmk NagVis | =2.2.0-p23 | |
Checkmk NagVis | =2.2.0-p24 | |
Checkmk NagVis | =2.2.0-p25 | |
Checkmk NagVis | =2.2.0-p3 | |
Checkmk NagVis | =2.2.0-p4 | |
Checkmk NagVis | =2.2.0-p5 | |
Checkmk NagVis | =2.2.0-p6 | |
Checkmk NagVis | =2.2.0-p7 | |
Checkmk NagVis | =2.2.0-p8 | |
Checkmk NagVis | =2.2.0-p9 | |
Checkmk NagVis | =2.3.0-b1 | |
Checkmk NagVis | =2.3.0-b2 | |
Checkmk NagVis | =2.3.0-b3 | |
Checkmk NagVis | =2.3.0-b4 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-28825?
CVE-2024-28825 is considered a medium severity vulnerability due to its potential to allow password brute-forcing.
How do I fix CVE-2024-28825?
To mitigate CVE-2024-28825, upgrade to Checkmk version 2.3.0b5 or later, or to 2.2.0p26 or later.
What versions of Checkmk are affected by CVE-2024-28825?
CVE-2024-28825 affects Checkmk versions before 2.3.0b5, as well as 2.2.0p26, 2.1.0p43, and 2.0.0.
What specifically does CVE-2024-28825 affect in Checkmk?
CVE-2024-28825 affects the authentication methods in Checkmk by improperly restricting excessive authentication attempts.
Is CVE-2024-28825 an ongoing risk?
Yes, if not updated, CVE-2024-28825 poses an ongoing risk of brute-force attacks against the authentication system.
- agent/weakness
- agent/title
- agent/references
- agent/description
- agent/type
- agent/first-publish-date
- agent/author
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/severity
- agent/event
- agent/softwarecombine
- agent/source
- agent/tags
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/checkmk
- canonical/checkmk nagvis
- version/checkmk nagvis/2.0.0
- version/checkmk nagvis/2.1.0
- version/checkmk nagvis/2.1.0-b1
- version/checkmk nagvis/2.1.0-b2
- version/checkmk nagvis/2.1.0-b3
- version/checkmk nagvis/2.1.0-b4
- version/checkmk nagvis/2.1.0-b5
- version/checkmk nagvis/2.1.0-b6
- version/checkmk nagvis/2.1.0-b7
- version/checkmk nagvis/2.1.0-b8
- version/checkmk nagvis/2.1.0-b9
- version/checkmk nagvis/2.1.0-p1
- version/checkmk nagvis/2.1.0-p10
- version/checkmk nagvis/2.1.0-p11
- version/checkmk nagvis/2.1.0-p12
- version/checkmk nagvis/2.1.0-p13
- version/checkmk nagvis/2.1.0-p14
- version/checkmk nagvis/2.1.0-p15
- version/checkmk nagvis/2.1.0-p16
- version/checkmk nagvis/2.1.0-p17
- version/checkmk nagvis/2.1.0-p18
- version/checkmk nagvis/2.1.0-p19
- version/checkmk nagvis/2.1.0-p2
- version/checkmk nagvis/2.1.0-p20
- version/checkmk nagvis/2.1.0-p21
- version/checkmk nagvis/2.1.0-p22
- version/checkmk nagvis/2.1.0-p23
- version/checkmk nagvis/2.1.0-p24
- version/checkmk nagvis/2.1.0-p25
- version/checkmk nagvis/2.1.0-p26
- version/checkmk nagvis/2.1.0-p27
- version/checkmk nagvis/2.1.0-p28
- version/checkmk nagvis/2.1.0-p29
- version/checkmk nagvis/2.1.0-p3
- version/checkmk nagvis/2.1.0-p30
- version/checkmk nagvis/2.1.0-p31
- version/checkmk nagvis/2.1.0-p32
- version/checkmk nagvis/2.1.0-p33
- version/checkmk nagvis/2.1.0-p34
- version/checkmk nagvis/2.1.0-p35
- version/checkmk nagvis/2.1.0-p36
- version/checkmk nagvis/2.1.0-p37
- version/checkmk nagvis/2.1.0-p38
- version/checkmk nagvis/2.1.0-p39
- version/checkmk nagvis/2.1.0-p4
- version/checkmk nagvis/2.1.0-p40
- version/checkmk nagvis/2.1.0-p41
- version/checkmk nagvis/2.1.0-p42
- version/checkmk nagvis/2.1.0-p5
- version/checkmk nagvis/2.1.0-p6
- version/checkmk nagvis/2.1.0-p7
- version/checkmk nagvis/2.1.0-p8
- version/checkmk nagvis/2.1.0-p9
- version/checkmk nagvis/2.2.0
- version/checkmk nagvis/2.2.0-b1
- version/checkmk nagvis/2.2.0-b2
- version/checkmk nagvis/2.2.0-b3
- version/checkmk nagvis/2.2.0-b4
- version/checkmk nagvis/2.2.0-b5
- version/checkmk nagvis/2.2.0-b6
- version/checkmk nagvis/2.2.0-b7
- version/checkmk nagvis/2.2.0-b8
- version/checkmk nagvis/2.2.0-i1
- version/checkmk nagvis/2.2.0-p1
- version/checkmk nagvis/2.2.0-p10
- version/checkmk nagvis/2.2.0-p11
- version/checkmk nagvis/2.2.0-p12
- version/checkmk nagvis/2.2.0-p13
- version/checkmk nagvis/2.2.0-p14
- version/checkmk nagvis/2.2.0-p15
- version/checkmk nagvis/2.2.0-p16
- version/checkmk nagvis/2.2.0-p17
- version/checkmk nagvis/2.2.0-p18
- version/checkmk nagvis/2.2.0-p19
- version/checkmk nagvis/2.2.0-p2
- version/checkmk nagvis/2.2.0-p20
- version/checkmk nagvis/2.2.0-p21
- version/checkmk nagvis/2.2.0-p22
- version/checkmk nagvis/2.2.0-p23
- version/checkmk nagvis/2.2.0-p24
- version/checkmk nagvis/2.2.0-p25
- version/checkmk nagvis/2.2.0-p3
- version/checkmk nagvis/2.2.0-p4
- version/checkmk nagvis/2.2.0-p5
- version/checkmk nagvis/2.2.0-p6
- version/checkmk nagvis/2.2.0-p7
- version/checkmk nagvis/2.2.0-p8
- version/checkmk nagvis/2.2.0-p9
- version/checkmk nagvis/2.3.0-b1
- version/checkmk nagvis/2.3.0-b2
- version/checkmk nagvis/2.3.0-b3
- version/checkmk nagvis/2.3.0-b4
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203