In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.
References
| Link | Resource |
|---|---|
| https://checkmk.com/werk/18570 | Vendor Advisory Mitigation |
Configurations
Configuration 1 (hide)
|
History
24 Nov 2025, 14:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://checkmk.com/werk/18570 - Vendor Advisory, Mitigation | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
| CPE | cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p15:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p39:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:b2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p40:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:* |
|
| First Time |
Checkmk
Checkmk checkmk |
18 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 16:15
Updated : 2025-11-24 14:13
NVD link : CVE-2025-64996
Mitre link : CVE-2025-64996
CVE.ORG link : CVE-2025-64996
JSON object : View
Products Affected
checkmk
- checkmk
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
