Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-48319 (GCVE-0-2022-48319)
Vulnerability from cvelistv5 – Published: 2023-02-20 16:56 – Updated: 2025-03-12 14:00
VLAI?
EPSS
Title
Host secret disclosed in Checkmk logs
Summary
Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.
Severity ?
6.5 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:10:59.635Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://checkmk.com/werk/14916"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-48319",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-12T14:00:22.741456Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-12T14:00:50.779Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Checkmk",
"vendor": "Tribe29",
"versions": [
{
"lessThanOrEqual": "2.0.0p29",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "2.1.0p13",
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "1.6.0p30",
"status": "affected",
"version": "1.6.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file."
}
],
"impacts": [
{
"capecId": "CAPEC-37",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-37 Retrieve Embedded Sensitive Data"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-20T16:56:18.397Z",
"orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"shortName": "Tribe29"
},
"references": [
{
"url": "https://checkmk.com/werk/14916"
}
],
"title": "Host secret disclosed in Checkmk logs"
}
},
"cveMetadata": {
"assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
"assignerShortName": "Tribe29",
"cveId": "CVE-2022-48319",
"datePublished": "2023-02-20T16:56:18.397Z",
"dateReserved": "2023-02-08T08:46:54.799Z",
"dateUpdated": "2025-03-12T14:00:50.779Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://checkmk.com/werk/14916\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:10:59.635Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48319\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-12T14:00:22.741456Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-12T14:00:28.138Z\"}}], \"cna\": {\"title\": \"Host secret disclosed in Checkmk logs\", \"impacts\": [{\"capecId\": \"CAPEC-37\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-37 Retrieve Embedded Sensitive Data\"}]}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\"}}], \"affected\": [{\"vendor\": \"Tribe29\", \"product\": \"Checkmk\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.0.0p29\"}, {\"status\": \"affected\", \"version\": \"2.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.1.0p13\"}, {\"status\": \"affected\", \"version\": \"1.6.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.6.0p30\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://checkmk.com/werk/14916\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"f7d6281c-4801-44ce-ace2-493291dedb0f\", \"shortName\": \"Tribe29\", \"dateUpdated\": \"2023-02-20T16:56:18.397Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-48319\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-12T14:00:50.779Z\", \"dateReserved\": \"2023-02-08T08:46:54.799Z\", \"assignerOrgId\": \"f7d6281c-4801-44ce-ace2-493291dedb0f\", \"datePublished\": \"2023-02-20T16:56:18.397Z\", \"assignerShortName\": \"Tribe29\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-C7VR-4QG5-Q9V7
Vulnerability from github – Published: 2023-02-20 18:30 – Updated: 2023-03-03 18:30
VLAI?
Details
Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2022-48319"
],
"database_specific": {
"cwe_ids": [
"CWE-200",
"CWE-532"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-02-20T17:15:00Z",
"severity": "MODERATE"
},
"details": "Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.",
"id": "GHSA-c7vr-4qg5-q9v7",
"modified": "2023-03-03T18:30:25Z",
"published": "2023-02-20T18:30:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48319"
},
{
"type": "WEB",
"url": "https://checkmk.com/werk/14916"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2022-48319
Vulnerability from fkie_nvd - Published: 2023-02-20 17:15 - Updated: 2024-11-21 07:33
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/14916 | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://checkmk.com/werk/14916 | Mitigation, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "F8EDFDCA-0778-4540-B1D5-D3A986258028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "54031390-D7E7-4A14-AA2F-923768B3685F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "F1B7E35F-5A07-424E-AA09-AC54104D612B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "8D4AC302-C8F5-4A2B-A73A-982D0AA2495A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "7A058C71-C39E-4109-B570-4A061013D033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "22BCFA79-B3D6-4FFF-A3D3-8C4C97AF17C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "2A1703D9-8EEB-432D-90E2-F847CDC4C204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "1A4C72BA-6D78-4911-83E4-4DABB2CAC47F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "081FD127-1066-4019-B521-9FADB85DBD4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
"matchCriteriaId": "C1A4F005-4823-4B2B-B4EF-4EFDB04CFB9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "357240B1-F0DA-4FA8-B782-D998951F4B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "2F828F54-04E2-4B98-91A7-B09ED833E88B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A4B8B300-8264-40AB-A839-7EACB988163B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB76A8DF-C870-482F-A488-DB2917ABD971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "04947B1B-CF67-4C11-8FE3-6C17FD35E2EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "591AEC3C-2F48-4E91-9881-42EEDD039C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "C5CA04C8-2C80-4C7E-B329-3FFCBEDEE663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "47A1C5AC-C8B7-495A-A5F4-CD4790358A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "B87D8B46-5B04-460D-BBA1-BB19234DA19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "C59EA30A-0B7D-4E58-A503-8C2F16B45004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "F2849E4C-09D1-48A5-B28E-F7A4CD3E8967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "F1E5549E-3272-478D-85D0-6F53EE731183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "CD0EA35B-EBFF-4E6F-BD2E-4BE165E81A3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "3F2C76F2-D457-4C7C-BE76-515CA45CA161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "0E5A374E-56C5-4EBA-967C-CDFE6A967DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "7D4568F0-8CCD-4517-B4E9-7E2CA228D659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "96893FF5-B85E-45AF-9020-5D767E954D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "425ABB56-3A2E-40E3-9701-E638F16E6ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "9EEF6054-B3B5-4AAC-B24B-147A38564992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "462C2826-237E-4061-8F14-3DE09CE9952C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "8DE8F008-1FC0-416C-B0D4-5A560CF985F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "53AA0AB2-E814-4378-9486-D9192293C1DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "D884D3AF-7D57-4DF6-82E8-556C35319ED2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "528BAFA3-ED39-45B5-8C81-A6FD76DDB49B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "02DA7C50-7360-4679-93A5-92C8DC5E8E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "71B49D90-9522-46C6-8948-B9C21CEA473C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "98C29296-D1F3-45A2-BF0A-22333150F416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "339226E6-532F-4FE2-A543-6B166A9BA7F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "986FDFA6-BE12-4268-9B90-F7D469BBE517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5D63367A-3B90-462E-B6AD-1CB5721FD45E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "E5E2E954-B3C3-4CC0-B2C8-0E2BEEC93016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*",
"matchCriteriaId": "1638594A-84F1-44F6-BB30-D4CC73ECDA38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b11:*:*:*:*:*:*",
"matchCriteriaId": "8BB84DA0-9033-4771-B293-80D283539F00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*",
"matchCriteriaId": "7B2757BF-E3B7-487A-8929-0208D3B0D3CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "B5193296-508C-400E-868B-A0D86D178042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "F01E79D2-EFA4-4A7E-A286-3E86F52B429D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "D12A6070-0542-4293-AE13-85D4E81E1672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "6AF633FE-DE7C-4548-9ED2-880E915FC33C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "62F02BC2-7010-4038-B381-0B8A83930E83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "0E3BC8A3-56DE-4EE6-9AD2-26C6005DE2BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "CB7C73EF-F306-4114-AD71-04BB7A5FD974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*",
"matchCriteriaId": "F15190EF-E3F5-4AD1-B748-C0E63C8CB741",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "30F84B89-7EC6-44E6-A164-4C170379D55C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "DDA94D2F-F27C-4DF6-84AE-8ED1BBC7F61E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "71CF8EFD-17F6-4D9A-961A-4B949A6C8B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "B04DC2A8-CF05-4FB2-AE2F-AE07943B998D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "1F3BECA6-983C-436E-A635-4E1FB9080E56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "51A9A2B4-3693-490A-94E2-64E1DB795646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "C14AB385-8A9F-46FA-A1C5-4A4A45C1B7F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "EC41CC5F-F088-4E65-B076-35665F0F6C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "D599652E-9F70-4F9E-B8E9-99AB09EE851B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "6DABDE38-A3AF-4DD2-928A-8B3A0AA054A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "EC636B76-B050-4B73-A524-21862B020797",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "D49B1D63-8FDD-45FD-99F0-AA9E4FBCCB00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "8AFA4AF4-8395-4BBB-BA78-7116AC1DCDE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "5565C1C5-5C23-4449-AB87-49A304382387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "78320525-F346-4419-81E3-4A47BD17C808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "EA91018D-DA38-4026-9F47-383F16C85031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "E8DBEF67-A9AE-46D5-89D0-076CDB1AA06A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "63E87316-1CB2-4CF4-B379-4284C8C39053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "75925C19-FBF4-4908-B8AD-E19E13B665DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "66FC7193-674F-42AA-8064-93786B5474C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "94BBC4B2-8AE6-4CCC-B194-5A4F9335AA84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "438E3BD0-93B3-4687-9E85-A08A5545FEB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "9CCE5845-1B77-4E97-B508-41400F4E1F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "BA6E512A-007A-4967-A958-F9E87CD85119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "3FCED94F-7683-40FE-B511-F1F49CDD1F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "0C4E70EC-3D46-40CE-AD59-597EFD721014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "12E695A8-9A1E-4D7A-AB3B-AAC2CF777773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "653632A8-E700-404A-ADB2-B3A50253ECB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "60733789-DDA3-4819-A9F1-70B76AC715CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:1.6.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "D90DBA66-EF97-4CE9-AD4C-3A82F70D2250",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file."
}
],
"id": "CVE-2022-48319",
"lastModified": "2024-11-21T07:33:09.233",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "security@checkmk.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-20T17:15:12.453",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/14916"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/14916"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2022-48319
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-48319",
"description": "Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.",
"id": "GSD-2022-48319"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-48319"
],
"details": "Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.",
"id": "GSD-2022-48319",
"modified": "2023-12-13T01:19:25.698813Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@checkmk.com",
"ID": "CVE-2022-48319",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Checkmk",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "2.0.0",
"version_value": "2.0.0p29"
},
{
"version_affected": "\u003c=",
"version_name": "2.1.0",
"version_value": "2.1.0p13"
},
{
"version_affected": "\u003c=",
"version_name": "1.6.0",
"version_value": "1.6.0p30"
}
]
}
}
]
},
"vendor_name": "Tribe29"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file."
}
]
},
"impact": {
"cvss": [
{
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-200",
"lang": "eng",
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://checkmk.com/werk/14916",
"refsource": "MISC",
"url": "https://checkmk.com/werk/14916"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:p13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.1.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p28:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:2.0.0:p29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p15:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p18:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p19:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p20:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p21:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p23:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p24:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p25:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p26:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p27:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p28:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p29:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:b11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:tribe29:checkmk:1.6.0:p30:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@checkmk.com",
"ID": "CVE-2022-48319"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29\u0027s Checkmk \u003c= 2.1.0p13, Checkmk \u003c= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://checkmk.com/werk/14916",
"refsource": "MISC",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/14916"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-03-03T17:48Z",
"publishedDate": "2023-02-20T17:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…