We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.
Reserved 2025-04-10 | Published 2025-05-08 | Updated 2025-05-08 | Assigner CheckmkCWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Norman Kühnberger (IT Südwestfalen GmbH)
Support options