CVE-2025-1075

7.5 HIGH

📋 TL;DR

This vulnerability in Checkmk monitoring software causes LDAP authentication credentials to be written to Apache error log files. Administrators with access to these log files can potentially read sensitive LDAP credentials. Affected are Checkmk installations running vulnerable versions that use LDAP authentication.

💻 Affected Systems

Products:
  • Checkmk GmbH Checkmk
Versions: Versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL)
Operating Systems: All platforms running Checkmk
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using LDAP authentication. The vulnerability occurs during LDAP authentication attempts.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrators or attackers with log file access obtain LDAP credentials, potentially leading to domain compromise through credential reuse or privilege escalation.

🟠

Likely Case

Administrators inadvertently expose LDAP credentials through log file access, leading to credential leakage within the organization.

🟢

If Mitigated

With proper log file permissions and access controls, only authorized administrators can access logs, limiting exposure to trusted personnel.

🌐 Internet-Facing: LOW - The vulnerability requires access to Apache error logs, which are typically not internet-accessible.
🏢 Internal Only: HIGH - Internal administrators have access to log files, making credential exposure likely within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to Apache error log files, typically requiring administrative privileges or compromised administrative accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.0p27, 2.2.0p40, or later versions

Vendor Advisory: https://checkmk.com/werk/17495

Restart Required: No

Instructions:

1. Backup your Checkmk configuration. 2. Update to Checkmk version 2.3.0p27 or 2.2.0p40 or later. 3. Verify the update completed successfully. 4. Check Apache error logs to confirm no further credential leakage.

🔧 Temporary Workarounds

Restrict Apache Error Log Access

all

Limit access to Apache error log files to only essential administrators

chmod 640 /var/log/apache2/error.log
chown root:adm /var/log/apache2/error.log

Disable LDAP Authentication

all

Temporarily disable LDAP authentication until patching is complete

omd config set LDAP_AUTH off
omd restart apache

🧯 If You Can't Patch

  • Implement strict access controls on Apache log directories and files
  • Regularly monitor and sanitize Apache error logs for credential leakage

🔍 How to Verify

Check if Vulnerable:

Check Checkmk version with 'omd version' and verify it's below 2.3.0p27, 2.2.0p40, or 2.1.0p51

Check Version:

omd version

Verify Fix Applied:

After updating, grep Apache error logs for LDAP credential patterns: 'grep -i ldap /var/log/apache2/error.log' should show no credentials

📡 Detection & Monitoring

Log Indicators:

  • LDAP credentials appearing in Apache error logs
  • Failed LDAP authentication attempts with credential logging

Network Indicators:

  • Unusual LDAP query patterns from Checkmk servers

SIEM Query:

source="apache_error.log" AND "LDAP" AND ("password" OR "credential" OR "binddn")

🔗 References

📤 Share & Export