First published: Mon Jun 10 2024(Updated: )
Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms.
Credit: security@checkmk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkmk NagVis | =2.3.0-p1 | |
Checkmk NagVis | =2.3.0-p2 | |
Checkmk NagVis | =2.3.0-p3 | |
Checkmk NagVis | =2.3.0-p4 | |
Checkmk NagVis | =2.3.0-p5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28833 is considered a high severity vulnerability due to its potential for brute-force attacks on two-factor authentication mechanisms.
To fix CVE-2024-28833, upgrade Checkmk to version 2.3.0p6 or later, which addresses the improper restriction of excessive authentication attempts.
CVE-2024-28833 affects Checkmk versions 2.3.0p1 through 2.3.0p5.
CVE-2024-28833 facilitates brute-forcing of second factor mechanisms due to improper restrictions on authentication attempts.
There is no specific workaround available for CVE-2024-28833; upgrading to the patched version is recommended.