CVE-2025-58121

5.4 MEDIUM

📋 TL;DR

This vulnerability allows low-privileged users in Checkmk to bypass permission checks on REST API endpoints, enabling unauthorized actions or access to sensitive information. It affects Checkmk versions 2.2.0, 2.3.0, and 2.4.0 before 2.4.0p16. Organizations using these versions with multiple user accounts are at risk.

💻 Affected Systems

Products:
  • Checkmk
Versions: 2.2.0, 2.3.0, and 2.4.0 before 2.4.0p16
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with multiple user accounts. Single-user installations are less impacted but still vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privileged users could escalate privileges, modify monitoring configurations, access sensitive system information, or disrupt monitoring operations.

🟠

Likely Case

Unauthorized users accessing data they shouldn't see, potentially exposing monitoring data, system information, or performing limited unauthorized actions.

🟢

If Mitigated

With proper network segmentation and minimal user accounts, impact is limited to authorized users exceeding their intended permissions.

🌐 Internet-Facing: MEDIUM - If Checkmk REST API is exposed to the internet, attackers could exploit this after obtaining low-privilege credentials.
🏢 Internal Only: HIGH - Internal users with any level of access could abuse this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated low-privilege access. Exploitation involves calling REST API endpoints that should be restricted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.0p16

Vendor Advisory: https://checkmk.com/werk/18983

Restart Required: Yes

Instructions:

1. Backup your Checkmk configuration. 2. Update to Checkmk 2.4.0p16 or later using your package manager. 3. Restart Checkmk services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict REST API Access

linux

Limit network access to Checkmk REST API endpoints using firewall rules.

iptables -A INPUT -p tcp --dport 5000 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 5000 -j DROP

Minimize User Accounts

all

Reduce the number of low-privilege user accounts and review existing permissions.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Checkmk from untrusted networks
  • Audit and reduce low-privilege user accounts, monitor for unusual API activity

🔍 How to Verify

Check if Vulnerable:

Check Checkmk version: omd version. If version is 2.2.0, 2.3.0, or 2.4.0 before p16, you are vulnerable.

Check Version:

omd version

Verify Fix Applied:

Verify version is 2.4.0p16 or later: omd version. Test that low-privilege users cannot access restricted API endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls from low-privilege users
  • Access to restricted endpoints in audit logs
  • Permission denied errors followed by successful access

Network Indicators:

  • Increased REST API traffic from unexpected sources
  • Pattern of API calls typical of privilege escalation attempts

SIEM Query:

source="checkmk" AND (event_type="api_call" AND user_role="low_privilege" AND endpoint IN sensitive_endpoints)

🔗 References

📤 Share & Export