checkmk CVE Vulnerabilities & Metrics

Focus on checkmk vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About checkmk Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with checkmk. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total checkmk CVEs: 69
Earliest CVE date: 02 Oct 2017, 01:29 UTC
Latest CVE date: 29 Nov 2024, 10:15 UTC

Latest CVE reference: CVE-2024-47094

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 28

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 55.56%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 55.56%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical checkmk CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.9

Max CVSS: 7.2

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 61
4.0-6.9 5
7.0-8.9 3
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS checkmk CVEs

These are the five CVEs with the highest CVSS scores for checkmk, sorted by severity first and recency.

All CVEs for checkmk

CVE-2024-47094 checkmk vulnerability CVSS: 0 29 Nov 2024, 10:15 UTC

Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p22, <2.2.0p37, <2.1.0p50 (EOL) causes remote site secrets to be written to web log files accessible to local site users.

CVE-2024-38863 checkmk vulnerability CVSS: 0 14 Oct 2024, 08:15 UTC

Exposure of CSRF tokens in query parameters on specific requests in Checkmk GmbH's Checkmk versions <2.3.0p18, <2.2.0p35 and <2.1.0p48 could lead to a leak of the token to facilitate targeted phishing attacks.

CVE-2024-38862 checkmk vulnerability CVSS: 0 14 Oct 2024, 08:15 UTC

Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p18, <2.2.0p35, <2.1.0p48 and <=2.0.0p39 (EOL) causes SNMP and IMPI secrets of host and folder properties to be written to audit log files accessible to administrators.

CVE-2024-6747 checkmk vulnerability CVSS: 0 10 Oct 2024, 08:15 UTC

Information leakage in mknotifyd in Checkmk before 2.3.0p18, 2.2.0p36, 2.1.0p49 and in 2.0.0p39 (EOL) allows attacker to get potentially sensitive data

CVE-2024-8606 checkmk vulnerability CVSS: 0 23 Sep 2024, 07:15 UTC

Bypass of two factor authentication in RestAPI in Checkmk < 2.3.0p16 and < 2.2.0p34 allows authenticated users to bypass two factor authentication

CVE-2024-38860 checkmk vulnerability CVSS: 0 17 Sep 2024, 14:15 UTC

Improper neutralization of input in Checkmk before versions 2.3.0p16 and 2.2.0p34 allows attackers to craft malicious links that can facilitate phishing attacks.

CVE-2024-38858 checkmk vulnerability CVSS: 0 02 Sep 2024, 12:15 UTC

Improper neutralization of input in Checkmk before version 2.3.0p14 allows attackers to inject and run malicious scripts in the Robotmk logs view.

CVE-2024-38859 checkmk vulnerability CVSS: 0 26 Aug 2024, 15:15 UTC

XSS in the view page with the SLA column configured in Checkmk versions prior to 2.3.0p14, 2.2.0p33, 2.1.0p47 and 2.0.0 (EOL) allowed malicious users to execute arbitrary scripts by injecting HTML elements into the SLA column title. These scripts could be executed when the view page was cloned by other users.

CVE-2024-28829 checkmk vulnerability CVSS: 0 20 Aug 2024, 10:15 UTC

Least privilege violation and reliance on untrusted inputs in the mk_informix Checkmk agent plugin before Checkmk 2.3.0p12, 2.2.0p32, 2.1.0p47 and 2.0.0 (EOL) allows local users to escalate privileges.

CVE-2024-6542 checkmk vulnerability CVSS: 0 22 Jul 2024, 10:15 UTC

Improper neutralization of livestatus command delimiters in mknotifyd in Checkmk <= 2.0.0p39, < 2.1.0p47, < 2.2.0p32 and < 2.3.0p11 allows arbitrary livestatus command execution.

CVE-2024-28828 checkmk vulnerability CVSS: 0 10 Jul 2024, 13:15 UTC

Cross-Site request forgery in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) could lead to 1-click compromize of the site.

CVE-2024-28827 checkmk vulnerability CVSS: 0 10 Jul 2024, 13:15 UTC

Incorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL) allows a local attacker to gain SYSTEM privileges.

CVE-2024-6163 checkmk vulnerability CVSS: 0 08 Jul 2024, 13:15 UTC

Certain http endpoints of Checkmk in Checkmk < 2.3.0p10 < 2.2.0p31, < 2.1.0p46, <= 2.0.0p39 allows remote attacker to bypass authentication and access data

CVE-2024-6052 checkmk vulnerability CVSS: 0 03 Jul 2024, 15:15 UTC

Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements

CVE-2024-38857 checkmk vulnerability CVSS: 0 02 Jul 2024, 08:15 UTC

Improper neutralization of input in Checkmk before versions 2.3.0p8, 2.2.0p28, 2.1.0p45, and 2.0.0 (EOL) allows attackers to craft malicious links that can facilitate phishing attacks.

CVE-2024-28830 checkmk vulnerability CVSS: 0 26 Jun 2024, 08:15 UTC

Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p7, <2.2.0p28, <2.1.0p45 and <=2.0.0p39 (EOL) causes automation user secrets to be written to audit log files accessible to administrators.

CVE-2024-28832 checkmk vulnerability CVSS: 0 25 Jun 2024, 12:15 UTC

Stored XSS in the Crash Report page in Checkmk before versions 2.3.0p7, 2.2.0p28, 2.1.0p45, and 2.0.0 (EOL) allows users with permission to change Global Settings to execute arbitrary scripts by injecting HTML elements into the Crash Report URL in the Global Settings.

CVE-2024-28831 checkmk vulnerability CVSS: 0 25 Jun 2024, 12:15 UTC

Stored XSS in some confirmation pop-ups in Checkmk before versions 2.3.0p7 and 2.2.0p28 allows Checkmk users to execute arbitrary scripts by injecting HTML elements into some user input fields that are shown in a confirmation pop-up.

CVE-2024-5741 checkmk vulnerability CVSS: 0 17 Jun 2024, 12:15 UTC

Stored XSS in inventory tree rendering in Checkmk before 2.3.0p7, 2.2.0p28, 2.1.0p45 and 2.0.0 (EOL)

CVE-2024-28833 checkmk vulnerability CVSS: 0 10 Jun 2024, 12:15 UTC

Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms.

CVE-2024-28826 checkmk vulnerability CVSS: 0 29 May 2024, 10:15 UTC

Improper restriction of local upload and download paths in check_sftp in Checkmk before 2.3.0p4, 2.2.0p27, 2.1.0p44, and in Checkmk 2.0.0 (EOL) allows attackers with sufficient permissions to configure the check to read and write local files on the Checkmk site server.

CVE-2024-28825 checkmk vulnerability CVSS: 0 24 Apr 2024, 12:15 UTC

Improper restriction of excessive authentication attempts on some authentication methods in Checkmk before 2.3.0b5 (beta), 2.2.0p26, 2.1.0p43, and in Checkmk 2.0.0 (EOL) facilitates password brute-forcing.

CVE-2024-3367 checkmk vulnerability CVSS: 0 16 Apr 2024, 12:15 UTC

Argument injection in websphere_mq agent plugin in Checkmk 2.0.0, 2.1.0, <2.2.0p26 and <2.3.0b5 allows local attacker to inject one argument to runmqsc

CVE-2024-2380 checkmk vulnerability CVSS: 0 05 Apr 2024, 13:15 UTC

Stored XSS in graph rendering in Checkmk <2.3.0b4.

CVE-2024-28824 checkmk vulnerability CVSS: 0 22 Mar 2024, 11:15 UTC

Least privilege violation and reliance on untrusted inputs in the mk_informix Checkmk agent plugin before Checkmk 2.3.0b4 (beta), 2.2.0p24, 2.1.0p41 and 2.0.0 (EOL) allows local users to escalate privileges.

CVE-2024-1742 checkmk vulnerability CVSS: 0 22 Mar 2024, 11:15 UTC

Invocation of the sqlplus command with sensitive information in the command line in the mk_oracle Checkmk agent plugin before Checkmk 2.3.0b4 (beta), 2.2.0p24, 2.1.0p41 and 2.0.0 (EOL) allows the extraction of this information from the process list.

CVE-2024-0638 checkmk vulnerability CVSS: 0 22 Mar 2024, 11:15 UTC

Least privilege violation in the Checkmk agent plugins mk_oracle, mk_oracle.ps1, and mk_oracle_crs before Checkmk 2.3.0b4 (beta), 2.2.0p24, 2.1.0p41 and 2.0.0 (EOL) allows local users to escalate privileges.

CVE-2024-0670 checkmk vulnerability CVSS: 0 11 Mar 2024, 15:15 UTC

Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges

CVE-2023-6740 checkmk vulnerability CVSS: 0 12 Jan 2024, 08:15 UTC

Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges

CVE-2023-6735 checkmk vulnerability CVSS: 0 12 Jan 2024, 08:15 UTC

Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges

CVE-2023-31211 checkmk vulnerability CVSS: 0 12 Jan 2024, 08:15 UTC

Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials

CVE-2023-31210 checkmk vulnerability CVSS: 0 13 Dec 2023, 09:15 UTC

Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries

CVE-2023-6251 checkmk vulnerability CVSS: 0 24 Nov 2023, 09:15 UTC

Cross-site Request Forgery (CSRF) in Checkmk < 2.2.0p15, < 2.1.0p37, <= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users.

CVE-2023-6157 checkmk vulnerability CVSS: 0 22 Nov 2023, 17:15 UTC

Improper neutralization of livestatus command delimiters in ajax_search in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.

CVE-2023-6156 checkmk vulnerability CVSS: 0 22 Nov 2023, 17:15 UTC

Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.

CVE-2023-23549 checkmk vulnerability CVSS: 0 15 Nov 2023, 11:15 UTC

Improper Input Validation in Checkmk <2.2.0p15, <2.1.0p37, <=2.0.0p39 allows priviledged attackers to cause partial denial of service of the UI via too long hostnames.

CVE-2023-31209 checkmk vulnerability CVSS: 0 10 Aug 2023, 09:15 UTC

Improper neutralization of active check command arguments in Checkmk < 2.1.0p32, < 2.0.0p38, < 2.2.0p4 leads to arbitrary command execution for authenticated users.

CVE-2023-23548 checkmk vulnerability CVSS: 0 01 Aug 2023, 10:15 UTC

Reflected XSS in business intelligence in Checkmk <2.2.0p8, <2.1.0p32, <2.0.0p38, <=1.6.0p30.

CVE-2023-22359 checkmk vulnerability CVSS: 0 26 Jun 2023, 07:15 UTC

User enumeration in Checkmk <=2.2.0p4 allows an authenticated attacker to enumerate usernames.

CVE-2023-22348 checkmk vulnerability CVSS: 0 17 May 2023, 16:15 UTC

Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.

CVE-2023-31208 checkmk vulnerability CVSS: 0 17 May 2023, 09:15 UTC

Improper neutralization of livestatus command delimiters in the RestAPI in Checkmk < 2.0.0p36, < 2.1.0p28, and < 2.2.0b8 (beta) allows arbitrary livestatus command execution for authorized users.

CVE-2023-31207 checkmk vulnerability CVSS: 0 02 May 2023, 09:15 UTC

Transmission of credentials within query parameters in Checkmk <= 2.1.0p26, <= 2.0.0p35, and <= 2.2.0b6 (beta) may cause the automation user's secret to be written to the site Apache access log.

CVE-2022-46302 checkmk vulnerability CVSS: 0 20 Apr 2023, 14:15 UTC

Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.

CVE-2023-2020 checkmk vulnerability CVSS: 0 18 Apr 2023, 12:15 UTC

Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host.

CVE-2023-1768 checkmk vulnerability CVSS: 0 04 Apr 2023, 07:15 UTC

Inappropriate error handling in Tribe29 Checkmk <= 2.1.0p25, <= 2.0.0p34, <= 2.2.0b3 (beta), and all versions of Checkmk 1.6.0 causes the symmetric encryption of agent data to fail silently and transmit the data in plaintext in certain configurations.

CVE-2023-22288 checkmk vulnerability CVSS: 0 20 Mar 2023, 16:15 UTC

HTML Email Injection in Tribe29 Checkmk <=2.1.0p23; <=2.0.0p34, and all versions of Checkmk 1.6.0 allows an authenticated attacker to inject malicious HTML into Emails

CVE-2022-48321 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29's Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.

CVE-2022-48320 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

Cross-site Request Forgery (CSRF) in Tribe29's Checkmk <= 2.1.0p17, Checkmk <= 2.0.0p31, and all versions of Checkmk 1.6.0 (EOL) allow an attacker to add new visual elements to multiple pages.

CVE-2022-48319 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.

CVE-2022-48318 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

No authorisation controls in the RestAPI documentation for Tribe29's Checkmk <= 2.1.0p13 and Checkmk <= 2.0.0p29 which may lead to unintended information disclosure through automatically generated user specific tags within Rest API documentation.

CVE-2022-48317 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.

CVE-2022-47909 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

Livestatus Query Language (LQL) injection in the AuthUser HTTP query header of Tribe29's Checkmk <= 2.1.0p11, Checkmk <= 2.0.0p28, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to perform direct queries to the application's core from localhost.

CVE-2022-46836 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.

CVE-2022-46303 checkmk vulnerability CVSS: 0 20 Feb 2023, 17:15 UTC

Command injection in SMS notifications in Tribe29 Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker with User Management permissions, as well as LDAP administrators in certain scenarios, to perform arbitrary commands within the context of the application's local permissions.

CVE-2022-43440 checkmk vulnerability CVSS: 0 09 Feb 2023, 09:15 UTC

Uncontrolled Search Path Element in Checkmk Agent in Tribe29 Checkmk before 2.1.0p1, before 2.0.0p25 and before 1.6.0p29 on a Checkmk server allows the site user to escalate privileges via a manipulated unixcat executable

CVE-2023-0284 checkmk vulnerability CVSS: 0 26 Jan 2023, 21:18 UTC

Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDAP user IDs to manipulate files on the server. Checkmk <= 2.1.0p19, Checkmk <= 2.0.0p32, and all versions of Checkmk 1.6.0 (EOL) are affected.

CVE-2022-4884 checkmk vulnerability CVSS: 0 09 Jan 2023, 17:15 UTC

Path-Traversal in MKP storing in Tribe29 Checkmk <=2.0.0p32 and <= 2.1.0p18 allows an administrator to write mkp files to arbitrary locations via a malicious mkp file.

CVE-2022-33912 checkmk vulnerability CVSS: 7.2 17 Jun 2022, 13:15 UTC

A permission issue affects users that deployed the shipped version of the Checkmk Debian package. Packages created by the agent bakery (enterprise editions only) were not affected. Using the shipped version of the agents, the maintainer scripts located at /var/lib/dpkg/info/ will be owned by the user and the group with ID 1001. If such a user exists on the system, they can change the content of these files (which are then executed by root). This leads to a local privilege escalation on the monitored host. Version 1.6 through 1.6.9p29, version 2.0 through 2.0.0p26, version 2.1 through 2.1.0p3, and version 2.2.0i1 are affected.

CVE-2022-31258 checkmk vulnerability CVSS: 7.2 20 May 2022, 23:15 UTC

In Checkmk before 1.6.0p29, 2.x before 2.0.0p25, and 2.1.x before 2.1.0b10, a site user can escalate to root by editing an OMD hook symlink.

CVE-2021-40906 checkmk vulnerability CVSS: 4.3 25 Mar 2022, 23:15 UTC

CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.

CVE-2021-40905 checkmk vulnerability CVSS: 6.8 25 Mar 2022, 23:15 UTC

The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner

CVE-2021-40904 checkmk vulnerability CVSS: 6.8 25 Mar 2022, 23:15 UTC

The web management console of CheckMK Raw Edition (versions 1.5.0 to 1.6.0) allows a misconfiguration of the web-app Dokuwiki (installed by default), which allows embedded php code. As a result, remote code execution is achieved. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session by a user with the role of administrator.

CVE-2022-24566 checkmk vulnerability CVSS: 3.5 24 Feb 2022, 15:15 UTC

In Checkmk <=2.0.0p19 fixed in 2.0.0p20 and Checkmk <=1.6.0p27 fixed in 1.6.0p28, the title of a Predefined condition is not properly escaped when shown as condition, which can result in Cross Site Scripting (XSS).

CVE-2022-24565 checkmk vulnerability CVSS: 3.5 24 Feb 2022, 15:15 UTC

Checkmk <=2.0.0p19 Fixed in 2.0.0p20 and Checkmk <=1.6.0p27 Fixed in 1.6.0p28 are affected by a Cross Site Scripting (XSS) vulnerability. The Alias of a site was not properly escaped when shown as condition for notifications.

CVE-2022-24564 checkmk vulnerability CVSS: 4.3 21 Feb 2022, 23:15 UTC

Checkmk <=2.0.0p19 contains a Cross Site Scripting (XSS) vulnerability. While creating or editing a user attribute, the Help Text is subject to HTML injection, which can be triggered for editing a user.

CVE-2020-28919 checkmk vulnerability CVSS: 3.5 15 Jan 2022, 17:15 UTC

A stored cross site scripting (XSS) vulnerability in Checkmk 1.6.0x prior to 1.6.0p19 allows an authenticated remote attacker to inject arbitrary JavaScript via a javascript: URL in a view title.

CVE-2021-36563 checkmk vulnerability CVSS: 3.5 26 Jul 2021, 18:15 UTC

The CheckMK management web console (versions 1.5.0 to 2.0.0) does not sanitise user input in various parameters of the WATO module. This allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts), the XSS payload will be triggered when the user accesses some specific sections of the application. In the same sense a very dangerous potential way would be when an attacker who has the monitor role (not administrator) manages to get a stored XSS to steal the secretAutomation (for the use of the API in administrator mode) and thus be able to create another administrator user who has high privileges on the CheckMK monitoring web console. Another way is that persistent XSS allows an attacker to modify the displayed content or change the victim's information. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session.

CVE-2020-24908 checkmk vulnerability CVSS: 7.2 19 Feb 2021, 06:15 UTC

Checkmk before 1.6.0p17 allows local users to obtain SYSTEM privileges via a Trojan horse shell script in the %PROGRAMDATA%\checkmk\agent\local directory.

CVE-2017-14955 checkmk vulnerability CVSS: 4.3 02 Oct 2017, 01:29 UTC

Check_MK before 1.2.8p26 mishandles certain errors within the failed-login save feature because of a race condition, which allows remote attackers to obtain sensitive user information by reading a GUI crash report.