CVE-2023-6735: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in Checkmk GmbH Checkmk
Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
AI Analysis
Technical Summary
CVE-2023-6735 is a high-severity privilege escalation vulnerability affecting the mk_tsm agent plugin in Checkmk versions prior to 2.2.0p18, 2.1.0p38, and 2.0.0p39. Checkmk is a widely used IT monitoring software developed by Checkmk GmbH. The vulnerability is classified under CWE-95, which involves improper neutralization of directives in dynamically evaluated code, commonly known as 'eval injection.' This flaw allows a local user with limited privileges to execute arbitrary code with elevated privileges by exploiting the way the mk_tsm plugin processes input. Specifically, the vulnerability arises because the plugin improperly handles dynamically evaluated code, enabling an attacker to inject malicious directives that the system executes. The CVSS v3.1 base score is 8.8, indicating a high severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that exploitation can lead to full system compromise. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity suggest that exploitation could allow an attacker to gain root or administrative privileges on the affected system, potentially leading to full control over the monitored infrastructure. This vulnerability is particularly critical because Checkmk is often deployed in enterprise environments to monitor critical IT infrastructure, making it a valuable target for attackers seeking to escalate privileges and move laterally within networks.
Potential Impact
For European organizations, the impact of CVE-2023-6735 could be significant, especially for those relying on Checkmk for monitoring critical IT infrastructure such as data centers, cloud environments, and industrial control systems. Successful exploitation could allow an attacker to escalate privileges from a local user account to root or administrative levels, enabling them to manipulate monitoring data, disable alerts, or use the compromised system as a foothold for further attacks within the network. This could lead to data breaches, disruption of services, and loss of integrity in monitoring systems, which are essential for maintaining operational continuity and security compliance. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory penalties under GDPR if sensitive data is exposed or if service disruptions affect customers. Additionally, the ability to escalate privileges locally means that insider threats or attackers who have gained limited access could leverage this vulnerability to cause extensive damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should urgently apply the patches released by Checkmk in versions 2.2.0p18, 2.1.0p38, and 2.0.0p39 or later. If immediate patching is not feasible, organizations should restrict local access to systems running vulnerable versions of Checkmk, limiting user permissions to only those necessary for operational tasks. Implement strict access controls and monitoring on systems hosting the mk_tsm agent plugin to detect any unusual activity indicative of exploitation attempts. Additionally, organizations should audit their Checkmk configurations to ensure that no untrusted input is processed by the mk_tsm plugin and consider disabling or isolating the plugin if it is not essential. Employing endpoint detection and response (EDR) solutions to monitor for suspicious local privilege escalation behaviors can provide early warning. Finally, maintain robust logging and alerting mechanisms to detect any unauthorized privilege escalations promptly.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2023-6735: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in Checkmk GmbH Checkmk
Description
Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
AI-Powered Analysis
Technical Analysis
CVE-2023-6735 is a high-severity privilege escalation vulnerability affecting the mk_tsm agent plugin in Checkmk versions prior to 2.2.0p18, 2.1.0p38, and 2.0.0p39. Checkmk is a widely used IT monitoring software developed by Checkmk GmbH. The vulnerability is classified under CWE-95, which involves improper neutralization of directives in dynamically evaluated code, commonly known as 'eval injection.' This flaw allows a local user with limited privileges to execute arbitrary code with elevated privileges by exploiting the way the mk_tsm plugin processes input. Specifically, the vulnerability arises because the plugin improperly handles dynamically evaluated code, enabling an attacker to inject malicious directives that the system executes. The CVSS v3.1 base score is 8.8, indicating a high severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L) but no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that exploitation can lead to full system compromise. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity suggest that exploitation could allow an attacker to gain root or administrative privileges on the affected system, potentially leading to full control over the monitored infrastructure. This vulnerability is particularly critical because Checkmk is often deployed in enterprise environments to monitor critical IT infrastructure, making it a valuable target for attackers seeking to escalate privileges and move laterally within networks.
Potential Impact
For European organizations, the impact of CVE-2023-6735 could be significant, especially for those relying on Checkmk for monitoring critical IT infrastructure such as data centers, cloud environments, and industrial control systems. Successful exploitation could allow an attacker to escalate privileges from a local user account to root or administrative levels, enabling them to manipulate monitoring data, disable alerts, or use the compromised system as a foothold for further attacks within the network. This could lead to data breaches, disruption of services, and loss of integrity in monitoring systems, which are essential for maintaining operational continuity and security compliance. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory penalties under GDPR if sensitive data is exposed or if service disruptions affect customers. Additionally, the ability to escalate privileges locally means that insider threats or attackers who have gained limited access could leverage this vulnerability to cause extensive damage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should urgently apply the patches released by Checkmk in versions 2.2.0p18, 2.1.0p38, and 2.0.0p39 or later. If immediate patching is not feasible, organizations should restrict local access to systems running vulnerable versions of Checkmk, limiting user permissions to only those necessary for operational tasks. Implement strict access controls and monitoring on systems hosting the mk_tsm agent plugin to detect any unusual activity indicative of exploitation attempts. Additionally, organizations should audit their Checkmk configurations to ensure that no untrusted input is processed by the mk_tsm plugin and consider disabling or isolating the plugin if it is not essential. Employing endpoint detection and response (EDR) solutions to monitor for suspicious local privilege escalation behaviors can provide early warning. Finally, maintain robust logging and alerting mechanisms to detect any unauthorized privilege escalations promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Checkmk
- Date Reserved
- 2023-12-12T15:27:34.769Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e664f
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 7/4/2025, 1:56:52 PM
Last updated: 7/31/2025, 1:11:52 PM
Views: 11
Related Threats
CVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.