CVE-2025-2092

7.5 HIGH

📋 TL;DR

This vulnerability causes Checkmk to write remote site authentication secrets to log files accessible to administrators. Attackers with access to these logs could obtain credentials to compromise connected monitoring sites. Affects Checkmk versions before 2.3.0p29, 2.2.0p41, and 2.1.0p49.

💻 Affected Systems

Products:
  • Checkmk
Versions: Versions <2.3.0p29, <2.2.0p41, and <=2.1.0p49 (EOL)
Operating Systems: All platforms running Checkmk
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations using remote site authentication. Checkmk 2.1.0 is End of Life (EOL).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain authentication secrets and compromise all connected remote monitoring sites, potentially gaining administrative access to monitored systems.

🟠

Likely Case

Administrators or attackers with log access obtain authentication secrets and compromise specific remote monitoring sites.

🟢

If Mitigated

Log files are properly secured with restricted permissions, limiting exposure to authorized administrators only.

🌐 Internet-Facing: LOW - The vulnerability requires access to log files, which are typically not internet-facing.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with log access can obtain sensitive authentication secrets.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires only read access to log files.

Exploitation requires access to log files, typically through administrative privileges or file system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.0p29, 2.2.0p41, or 2.1.0p49

Vendor Advisory: https://checkmk.com/werk/17780

Restart Required: Yes

Instructions:

1. Backup your Checkmk configuration. 2. Update to the patched version using your package manager or Checkmk's update mechanism. 3. Restart Checkmk services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict log file permissions

linux

Set strict file permissions on Checkmk log files to prevent unauthorized access.

chmod 640 /var/log/checkmk/*.log
chown root:omd /var/log/checkmk/*.log

Disable remote site authentication

all

Temporarily disable remote site authentication if not required.

🧯 If You Can't Patch

  • Implement strict access controls on log directories and files
  • Monitor log file access and implement alerting for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check your Checkmk version: omd version. If version is <2.3.0p29, <2.2.0p41, or <=2.1.0p49, you are vulnerable.

Check Version:

omd version

Verify Fix Applied:

Verify version is >=2.3.0p29, >=2.2.0p41, or >=2.1.0p49. Check that authentication secrets no longer appear in log files.

📡 Detection & Monitoring

Log Indicators:

  • Authentication secrets appearing in Checkmk log files
  • Unauthorized access to log directories

Network Indicators:

  • Unusual authentication attempts to remote sites

SIEM Query:

source="checkmk.log" AND ("authentication" OR "secret" OR "password")

🔗 References

📤 Share & Export