CVE-2025-32919

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on Windows systems running affected Checkmk Windows Agent versions. An attacker with local access can exploit insecure temporary directory handling in the Windows License plugin to execute arbitrary code with SYSTEM privileges. This affects Checkmk installations on Windows with vulnerable agent versions.

💻 Affected Systems

Products:
  • Checkmk Windows Agent
Versions: Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. The vulnerability is in the Windows License plugin component of the Checkmk agent.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege compromise allowing complete control of the Windows host, installation of persistent malware, credential theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM privileges, enabling installation of additional tools, disabling security controls, and accessing sensitive data.

🟢

If Mitigated

Limited impact if proper endpoint protection, application whitelisting, and least privilege principles are enforced, though privilege escalation path remains available.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any compromised user account on affected Windows systems can escalate to SYSTEM privileges, posing significant internal threat.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the Windows system. Public proof-of-concept code is available in the referenced GitHub advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.0p13, 2.3.0p38, or 2.2.0p46 depending on your version

Vendor Advisory: https://checkmk.com/werk/18207

Restart Required: Yes

Instructions:

1. Identify your Checkmk version. 2. Upgrade to patched version: 2.4.0p13, 2.3.0p38, or 2.2.0p46. 3. Restart the Checkmk agent service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Remove vulnerable plugin

windows

Temporarily disable or remove the vulnerable Windows License plugin

Remove or rename the Windows License plugin file in the Checkmk agent plugins directory

Restrict plugin permissions

windows

Set restrictive permissions on the temporary directory used by the plugin

icacls "C:\ProgramData\checkmk\agent\tmp" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F"

🧯 If You Can't Patch

  • Implement strict endpoint protection with behavioral monitoring for privilege escalation attempts
  • Enforce least privilege principles and restrict local user access to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check Checkmk agent version and compare against affected versions. Also check if Windows License plugin exists in agent plugins directory.

Check Version:

check_mk_agent.exe --version or check the agent version in Checkmk web interface

Verify Fix Applied:

Verify agent version is 2.4.0p13, 2.3.0p38, or 2.2.0p46 or higher. Check that temporary directory permissions are secure.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Checkmk agent directories
  • Privilege escalation attempts involving Checkmk processes
  • File creation in insecure temporary directories by SYSTEM account

Network Indicators:

  • Unusual outbound connections from Checkmk agent systems following local compromise

SIEM Query:

Process Creation where (Image contains 'checkmk' OR ParentImage contains 'checkmk') AND IntegrityLevel changed to 'System'

🔗 References

📤 Share & Export