Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13722: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Checkmk NagVis

0
Medium
VulnerabilityCVE-2024-13722cvecve-2024-13722cwe-79
Published: Tue Feb 04 2025 (02/04/2025, 22:04:00 UTC)
Source: CVE Database V5
Vendor/Project: Checkmk
Product: NagVis

Description

The "NagVis" component within Checkmk is vulnerable to reflected cross-site scripting. An attacker can craft a malicious link that will execute arbitrary JavaScript in the context of the browser once clicked. The attack can be performed on both authenticated and unauthenticated users.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:49:38 UTC

Technical Analysis

CVE-2024-13722 identifies a reflected cross-site scripting (XSS) vulnerability in the NagVis visualization component of the Checkmk monitoring software, specifically in versions NagVis 1.9.40 and Checkmk 2.3.0p2. The vulnerability arises due to improper neutralization of user-supplied input during web page generation, classified under CWE-79. An attacker can craft a specially designed URL containing malicious JavaScript code that, when clicked by a user, executes within the context of the victim's browser session. This execution can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions on behalf of the user. The vulnerability affects both authenticated and unauthenticated users, broadening the scope of potential targets. The CVSS 3.1 base score is 5.4, reflecting a medium severity with attack vector as network, low attack complexity, requiring low privileges and user interaction, and impacting confidentiality and integrity with no availability impact. No public exploits have been reported yet, but the vulnerability's presence in monitoring infrastructure software like Checkmk NagVis is concerning due to the sensitive nature of monitoring data and potential access to internal network information. The lack of available patches at the time of reporting necessitates immediate attention to mitigation strategies.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of monitoring data and user sessions within Checkmk NagVis environments. Successful exploitation could allow attackers to hijack user sessions, steal credentials, or perform unauthorized actions within the monitoring platform, potentially leading to further network reconnaissance or lateral movement. Given that NagVis is used for visualizing network and system monitoring data, compromise could expose sensitive operational information or disrupt trust in monitoring outputs. Organizations relying on Checkmk NagVis for critical infrastructure monitoring may face increased risk of targeted attacks, especially if attackers leverage this XSS flaw as an initial foothold. The vulnerability's ability to affect unauthenticated users increases exposure, particularly in environments where NagVis interfaces are accessible externally or to a broad user base. While no availability impact is noted, the indirect consequences of compromised monitoring data integrity could affect incident response and operational decision-making.

Mitigation Recommendations

European organizations should immediately assess their use of Checkmk NagVis versions 1.9.40 and Checkmk 2.3.0p2 and plan for prompt upgrades once patches become available. In the interim, implement strict input validation and output encoding on all user-supplied data within NagVis interfaces to prevent script injection. Employ web application firewalls (WAFs) with rules targeting common XSS attack patterns to block malicious payloads. Restrict access to NagVis interfaces to trusted networks and authenticated users where possible, reducing exposure to unauthenticated attacks. Educate users to avoid clicking suspicious links related to NagVis and monitor logs for unusual access patterns or attempted exploitation. Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing NagVis. Regularly review and update security configurations and conduct penetration testing focused on web application vulnerabilities in monitoring tools. Finally, maintain vigilance for vendor updates and advisories to apply official patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
KoreLogic
Date Reserved
2025-01-24T18:22:32.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690904b000ff46172d4a0e09

Added to database: 11/3/2025, 7:38:24 PM

Last enriched: 11/3/2025, 7:49:38 PM

Last updated: 11/5/2025, 3:05:53 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats