CVE-2023-6735

8.8 HIGH

📋 TL;DR

This vulnerability allows local users on systems running vulnerable Checkmk versions to escalate their privileges to root/admin level. It affects Checkmk installations where the mk_tsm agent plugin is present. Attackers with local access can exploit this to gain full system control.

💻 Affected Systems

Products:
  • Checkmk
Versions: Checkmk before 2.2.0p18, 2.1.0p38, and 2.0.0p39
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with mk_tsm agent plugin enabled (default configuration).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement to other systems.

🟠

Likely Case

Malicious insider or compromised low-privilege account escalates to root, installs backdoors, steals sensitive monitoring data, and disrupts monitoring operations.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to isolated system with quick detection and containment.

🌐 Internet-Facing: LOW - Requires local access, not directly exploitable over network.
🏢 Internal Only: HIGH - Any local user account can exploit this, including compromised service accounts or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local user access but exploit is likely simple based on CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.0p18, 2.1.0p38, or 2.0.0p39

Vendor Advisory: https://checkmk.com/werk/16273

Restart Required: Yes

Instructions:

1. Backup your Checkmk configuration. 2. Update to patched version via 'omd update' or package manager. 3. Restart Checkmk services. 4. Verify update with 'omd version'.

🔧 Temporary Workarounds

Disable mk_tsm plugin

linux

Temporarily disable the vulnerable plugin until patching

omd config set AGENT_RECEIVER off
systemctl restart check-mk-agent

Restrict local user access

linux

Limit local user accounts on Checkmk servers

review /etc/passwd for unnecessary accounts
implement sudo restrictions

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts on Checkmk servers
  • Monitor for privilege escalation attempts and unusual root activity

🔍 How to Verify

Check if Vulnerable:

Check Checkmk version with 'omd version' and compare against vulnerable versions (before 2.2.0p18, 2.1.0p38, 2.0.0p39)

Check Version:

omd version

Verify Fix Applied:

Confirm version is 2.2.0p18, 2.1.0p38, or 2.0.0p39 or later with 'omd version'

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation in system logs
  • Unusual mk_tsm plugin activity
  • Sudden root access from non-admin accounts

Network Indicators:

  • Unusual outbound connections from Checkmk server post-exploit

SIEM Query:

source="checkmk.log" AND ("privilege escalation" OR "root access" OR "mk_tsm")

🔗 References

📤 Share & Export