First published: Wed May 29 2024(Updated: )
Improper restriction of local upload and download paths in check_sftp in Checkmk before 2.3.0p4, 2.2.0p27, 2.1.0p44, and in Checkmk 2.0.0 (EOL) allows attackers with sufficient permissions to configure the check to read and write local files on the Checkmk site server.
Credit: security@checkmk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkmk NagVis | <=2.0.0 | |
Checkmk NagVis | =2.1.0 | |
Checkmk NagVis | =2.1.0-b1 | |
Checkmk NagVis | =2.1.0-b2 | |
Checkmk NagVis | =2.1.0-b3 | |
Checkmk NagVis | =2.1.0-b4 | |
Checkmk NagVis | =2.1.0-b5 | |
Checkmk NagVis | =2.1.0-b6 | |
Checkmk NagVis | =2.1.0-b7 | |
Checkmk NagVis | =2.1.0-b8 | |
Checkmk NagVis | =2.1.0-b9 | |
Checkmk NagVis | =2.1.0-p1 | |
Checkmk NagVis | =2.1.0-p10 | |
Checkmk NagVis | =2.1.0-p11 | |
Checkmk NagVis | =2.1.0-p12 | |
Checkmk NagVis | =2.1.0-p13 | |
Checkmk NagVis | =2.1.0-p14 | |
Checkmk NagVis | =2.1.0-p15 | |
Checkmk NagVis | =2.1.0-p16 | |
Checkmk NagVis | =2.1.0-p17 | |
Checkmk NagVis | =2.1.0-p18 | |
Checkmk NagVis | =2.1.0-p19 | |
Checkmk NagVis | =2.1.0-p2 | |
Checkmk NagVis | =2.1.0-p20 | |
Checkmk NagVis | =2.1.0-p21 | |
Checkmk NagVis | =2.1.0-p22 | |
Checkmk NagVis | =2.1.0-p23 | |
Checkmk NagVis | =2.1.0-p24 | |
Checkmk NagVis | =2.1.0-p25 | |
Checkmk NagVis | =2.1.0-p26 | |
Checkmk NagVis | =2.1.0-p27 | |
Checkmk NagVis | =2.1.0-p28 | |
Checkmk NagVis | =2.1.0-p29 | |
Checkmk NagVis | =2.1.0-p3 | |
Checkmk NagVis | =2.1.0-p30 | |
Checkmk NagVis | =2.1.0-p31 | |
Checkmk NagVis | =2.1.0-p32 | |
Checkmk NagVis | =2.1.0-p33 | |
Checkmk NagVis | =2.1.0-p34 | |
Checkmk NagVis | =2.1.0-p35 | |
Checkmk NagVis | =2.1.0-p36 | |
Checkmk NagVis | =2.1.0-p37 | |
Checkmk NagVis | =2.1.0-p38 | |
Checkmk NagVis | =2.1.0-p39 | |
Checkmk NagVis | =2.1.0-p4 | |
Checkmk NagVis | =2.1.0-p40 | |
Checkmk NagVis | =2.1.0-p41 | |
Checkmk NagVis | =2.1.0-p42 | |
Checkmk NagVis | =2.1.0-p43 | |
Checkmk NagVis | =2.1.0-p5 | |
Checkmk NagVis | =2.1.0-p6 | |
Checkmk NagVis | =2.1.0-p7 | |
Checkmk NagVis | =2.1.0-p8 | |
Checkmk NagVis | =2.1.0-p9 | |
Checkmk NagVis | =2.2.0 | |
Checkmk NagVis | =2.2.0-b1 | |
Checkmk NagVis | =2.2.0-b2 | |
Checkmk NagVis | =2.2.0-b3 | |
Checkmk NagVis | =2.2.0-b4 | |
Checkmk NagVis | =2.2.0-b5 | |
Checkmk NagVis | =2.2.0-b6 | |
Checkmk NagVis | =2.2.0-b7 | |
Checkmk NagVis | =2.2.0-b8 | |
Checkmk NagVis | =2.2.0-i1 | |
Checkmk NagVis | =2.2.0-p1 | |
Checkmk NagVis | =2.2.0-p10 | |
Checkmk NagVis | =2.2.0-p11 | |
Checkmk NagVis | =2.2.0-p12 | |
Checkmk NagVis | =2.2.0-p13 | |
Checkmk NagVis | =2.2.0-p14 | |
Checkmk NagVis | =2.2.0-p15 | |
Checkmk NagVis | =2.2.0-p16 | |
Checkmk NagVis | =2.2.0-p17 | |
Checkmk NagVis | =2.2.0-p18 | |
Checkmk NagVis | =2.2.0-p19 | |
Checkmk NagVis | =2.2.0-p2 | |
Checkmk NagVis | =2.2.0-p20 | |
Checkmk NagVis | =2.2.0-p21 | |
Checkmk NagVis | =2.2.0-p22 | |
Checkmk NagVis | =2.2.0-p23 | |
Checkmk NagVis | =2.2.0-p24 | |
Checkmk NagVis | =2.2.0-p25 | |
Checkmk NagVis | =2.2.0-p26 | |
Checkmk NagVis | =2.2.0-p3 | |
Checkmk NagVis | =2.2.0-p4 | |
Checkmk NagVis | =2.2.0-p5 | |
Checkmk NagVis | =2.2.0-p6 | |
Checkmk NagVis | =2.2.0-p7 | |
Checkmk NagVis | =2.2.0-p8 | |
Checkmk NagVis | =2.2.0-p9 | |
Checkmk NagVis | =2.3.0 | |
Checkmk NagVis | =2.3.0-b1 | |
Checkmk NagVis | =2.3.0-b2 | |
Checkmk NagVis | =2.3.0-b3 | |
Checkmk NagVis | =2.3.0-b4 | |
Checkmk NagVis | =2.3.0-b5 | |
Checkmk NagVis | =2.3.0-b6 | |
Checkmk NagVis | =2.3.0-p1 | |
Checkmk NagVis | =2.3.0-p2 | |
Checkmk NagVis | =2.3.0-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28826 has a high severity rating due to its potential to allow unauthorized file access on the Checkmk site server.
To fix CVE-2024-28826, upgrade to Checkmk version 2.3.0p4, 2.2.0p27, or 2.1.0p44 or a later version.
CVE-2024-28826 is classified as a privilege escalation vulnerability affecting configuration settings.
CVE-2024-28826 affects users of Checkmk versions prior to 2.3.0p4, 2.2.0p27, and 2.1.0p44.
CVE-2024-28826 allows attackers with sufficient permissions to read and write local files on the Checkmk site server.