CVE-2025-32915

5.5 MEDIUM

📋 TL;DR

This vulnerability allows local attackers on Linux and Solaris systems to read sensitive data from Checkmk agent update packages due to incorrect file permissions. It affects Checkmk installations with automatic agent updates enabled on vulnerable versions. Attackers must have local access to the system to exploit this.

💻 Affected Systems

Products:
  • Checkmk
Versions: Checkmk < 2.4.0p1, < 2.3.0p32, < 2.2.0p42, and <= 2.1.0p49 (EOL)
Operating Systems: Linux, Solaris
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with automatic agent updates enabled. Windows systems are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers could read sensitive configuration data, credentials, or other information stored in agent update packages, potentially leading to privilege escalation or lateral movement.

🟠

Likely Case

Local users or compromised low-privilege accounts reading sensitive agent configuration data that could be used for further attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure from agent packages only.

🌐 Internet-Facing: LOW - This requires local access to the system, not remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts with local access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability is in file permissions, making exploitation straightforward for local users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.0p1, 2.3.0p32, 2.2.0p42, or later

Vendor Advisory: https://checkmk.com/werk/17099

Restart Required: No

Instructions:

1. Upgrade to patched version: 2.4.0p1, 2.3.0p32, or 2.2.0p42 depending on your current version. 2. For EOL versions (<= 2.1.0p49), upgrade to a supported version. 3. No restart required for the fix.

🔧 Temporary Workarounds

Manual permission correction

linux

Manually set correct permissions on agent update packages

chmod 600 /path/to/agent/update/packages/*
chown root:root /path/to/agent/update/packages/*

Disable automatic agent updates

all

Temporarily disable automatic agent updates until patched

# Edit Checkmk configuration to disable automatic updates
# Location varies by installation

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to Checkmk directories
  • Monitor file access to agent update packages and alert on suspicious reads

🔍 How to Verify

Check if Vulnerable:

Check Checkmk version and verify if automatic agent updates are enabled. Examine permissions on agent update packages in /omd/sites/[site]/var/check_mk/agents/ (or similar location).

Check Version:

omd version

Verify Fix Applied:

After patching, verify version is >= patched versions and check that agent update packages have restrictive permissions (600 or similar).

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns to agent update packages
  • Multiple failed permission changes

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="checkmk" AND (event="file_access" OR event="permission_change") AND target_path="*/agents/*"

🔗 References

📤 Share & Export