8.8

CVE-2024-28824

Least privilege violation and reliance on untrusted inputs in the mk_informix Checkmk agent plugin before Checkmk 2.3.0b4 (beta), 2.2.0p24, 2.1.0p41 and 2.0.0 (EOL) allows local users to escalate privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CheckmkCheckmk Version <= 2.0.0
CheckmkCheckmk Version2.1.0 Update-
CheckmkCheckmk Version2.1.0 Updateb1
CheckmkCheckmk Version2.1.0 Updateb2
CheckmkCheckmk Version2.1.0 Updateb3
CheckmkCheckmk Version2.1.0 Updateb4
CheckmkCheckmk Version2.1.0 Updateb5
CheckmkCheckmk Version2.1.0 Updateb6
CheckmkCheckmk Version2.1.0 Updateb7
CheckmkCheckmk Version2.1.0 Updateb8
CheckmkCheckmk Version2.1.0 Updateb9
CheckmkCheckmk Version2.1.0 Updatep1
CheckmkCheckmk Version2.1.0 Updatep10
CheckmkCheckmk Version2.1.0 Updatep11
CheckmkCheckmk Version2.1.0 Updatep12
CheckmkCheckmk Version2.1.0 Updatep13
CheckmkCheckmk Version2.1.0 Updatep14
CheckmkCheckmk Version2.1.0 Updatep15
CheckmkCheckmk Version2.1.0 Updatep16
CheckmkCheckmk Version2.1.0 Updatep17
CheckmkCheckmk Version2.1.0 Updatep18
CheckmkCheckmk Version2.1.0 Updatep19
CheckmkCheckmk Version2.1.0 Updatep2
CheckmkCheckmk Version2.1.0 Updatep20
CheckmkCheckmk Version2.1.0 Updatep21
CheckmkCheckmk Version2.1.0 Updatep22
CheckmkCheckmk Version2.1.0 Updatep23
CheckmkCheckmk Version2.1.0 Updatep24
CheckmkCheckmk Version2.1.0 Updatep25
CheckmkCheckmk Version2.1.0 Updatep26
CheckmkCheckmk Version2.1.0 Updatep27
CheckmkCheckmk Version2.1.0 Updatep28
CheckmkCheckmk Version2.1.0 Updatep29
CheckmkCheckmk Version2.1.0 Updatep3
CheckmkCheckmk Version2.1.0 Updatep30
CheckmkCheckmk Version2.1.0 Updatep31
CheckmkCheckmk Version2.1.0 Updatep32
CheckmkCheckmk Version2.1.0 Updatep33
CheckmkCheckmk Version2.1.0 Updatep34
CheckmkCheckmk Version2.1.0 Updatep35
CheckmkCheckmk Version2.1.0 Updatep36
CheckmkCheckmk Version2.1.0 Updatep37
CheckmkCheckmk Version2.1.0 Updatep38
CheckmkCheckmk Version2.1.0 Updatep39
CheckmkCheckmk Version2.1.0 Updatep4
CheckmkCheckmk Version2.1.0 Updatep40
CheckmkCheckmk Version2.1.0 Updatep5
CheckmkCheckmk Version2.1.0 Updatep6
CheckmkCheckmk Version2.1.0 Updatep7
CheckmkCheckmk Version2.1.0 Updatep8
CheckmkCheckmk Version2.1.0 Updatep9
CheckmkCheckmk Version2.2.0 Update-
CheckmkCheckmk Version2.2.0 Updateb1
CheckmkCheckmk Version2.2.0 Updateb2
CheckmkCheckmk Version2.2.0 Updateb3
CheckmkCheckmk Version2.2.0 Updateb4
CheckmkCheckmk Version2.2.0 Updateb5
CheckmkCheckmk Version2.2.0 Updateb6
CheckmkCheckmk Version2.2.0 Updateb7
CheckmkCheckmk Version2.2.0 Updateb8
CheckmkCheckmk Version2.2.0 Updatei1
CheckmkCheckmk Version2.2.0 Updatep1
CheckmkCheckmk Version2.2.0 Updatep10
CheckmkCheckmk Version2.2.0 Updatep11
CheckmkCheckmk Version2.2.0 Updatep12
CheckmkCheckmk Version2.2.0 Updatep13
CheckmkCheckmk Version2.2.0 Updatep14
CheckmkCheckmk Version2.2.0 Updatep15
CheckmkCheckmk Version2.2.0 Updatep16
CheckmkCheckmk Version2.2.0 Updatep17
CheckmkCheckmk Version2.2.0 Updatep18
CheckmkCheckmk Version2.2.0 Updatep19
CheckmkCheckmk Version2.2.0 Updatep2
CheckmkCheckmk Version2.2.0 Updatep20
CheckmkCheckmk Version2.2.0 Updatep21
CheckmkCheckmk Version2.2.0 Updatep22
CheckmkCheckmk Version2.2.0 Updatep23
CheckmkCheckmk Version2.2.0 Updatep3
CheckmkCheckmk Version2.2.0 Updatep4
CheckmkCheckmk Version2.2.0 Updatep5
CheckmkCheckmk Version2.2.0 Updatep6
CheckmkCheckmk Version2.2.0 Updatep7
CheckmkCheckmk Version2.2.0 Updatep8
CheckmkCheckmk Version2.2.0 Updatep9
CheckmkCheckmk Version2.3.0 Updateb1
CheckmkCheckmk Version2.3.0 Updateb2
CheckmkCheckmk Version2.3.0 Updateb3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.266
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
security@checkmk.com 8.8 2 6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-272 Least Privilege Violation

The elevated privilege level required to perform operations such as chroot() should be dropped immediately after the operation is performed.

CWE-807 Reliance on Untrusted Inputs in a Security Decision

The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.