CVE-2026-24097
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker who is already logged into Checkmk to find out details about existing hosts by looking at different responses from the system. It occurs because the system doesn't properly check permissions, making it easier for these users to access sensitive information.
Technical Description
Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p23, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows authenticated users to enumerate existing hosts by observing different HTTP response codes in agent-receiver/register_existing endpoint, which could lead to information disclosure.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 13, 2026
25 days ago
Last Modified
Mar 18, 2026
20 days ago
Vendor
checkmk
Product
checkmk
Related Vulnerabilities
A low-privileged user can exploit a flaw in Checkmk to unintentionally delete important data. This issue affects specific older versions of the software, so users running those versions should update to avoid potential data loss.
This vulnerability allows an attacker to inject malicious JavaScript into the monitoring logs of Checkmk, which can then be accessed through a specially crafted phishing link. To exploit this, the attacker needs to manipulate the output from a monitored host, making it essential for them to have some level of access to the system.