CVE-2024-28827

8.8 HIGH

📋 TL;DR

This vulnerability allows a local attacker to escalate privileges to SYSTEM level on Windows systems running vulnerable Checkmk Windows Agent versions. The issue stems from incorrect permissions on the agent's data directory, enabling unauthorized access. Organizations using Checkmk monitoring on Windows endpoints with affected agent versions are at risk.

💻 Affected Systems

Products:
  • Checkmk Windows Agent
Versions: Checkmk < 2.3.0p8, < 2.2.0p29, < 2.1.0p45, and <= 2.0.0p39 (EOL)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of Checkmk Agent. Linux and other platforms are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege compromise allowing complete control over the Windows system, installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized administrative access, data exfiltration, and potential ransomware deployment on affected systems.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation preventing lateral movement even if local escalation occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system, not remotely exploitable.
🏢 Internal Only: HIGH - Any compromised user account with local access to vulnerable Windows systems can escalate to SYSTEM privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the Windows system but exploitation is straightforward once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Checkmk 2.3.0p8, 2.2.0p29, 2.1.0p45, or later

Vendor Advisory: https://checkmk.com/werk/16845

Restart Required: Yes

Instructions:

1. Identify affected Checkmk Windows Agent installations. 2. Upgrade to patched versions: 2.3.0p8+, 2.2.0p29+, or 2.1.0p45+. 3. Restart the Checkmk Agent service on Windows systems.

🔧 Temporary Workarounds

Restrict data directory permissions

windows

Manually set proper permissions on the Checkmk Agent data directory to prevent unauthorized access

icacls "C:\ProgramData\checkmk\agent\data" /inheritance:r /grant "SYSTEM:(OI)(CI)F" /grant "Administrators:(OI)(CI)F" /grant "LOCAL SERVICE:(OI)(CI)RX"

🧯 If You Can't Patch

  • Implement strict access controls and monitoring on Windows systems with vulnerable agents
  • Segment network to limit lateral movement from potentially compromised systems

🔍 How to Verify

Check if Vulnerable:

Check Checkmk Agent version on Windows systems: Open Services, find Checkmk Agent service, check properties for version information.

Check Version:

sc query "Checkmk Agent" | findstr /i "display_name" or check service properties in Windows Services

Verify Fix Applied:

Verify version is 2.3.0p8+, 2.2.0p29+, or 2.1.0p45+ and check data directory permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts
  • Checkmk Agent logs showing unauthorized access to data directory
  • Security logs with unexpected SYSTEM privilege usage

Network Indicators:

  • Unusual outbound connections from Windows systems running Checkmk Agent
  • Lateral movement attempts from previously low-privilege systems

SIEM Query:

EventID=4672 OR EventID=4688 AND ProcessName contains 'checkmk' AND NewTokenElevationType=2

🔗 References

📤 Share & Export