Skip to main content

CVE-2025-32915: CWE-732: Incorrect Permission Assignment for Critical Resource in Checkmk GmbH Checkmk

Medium
VulnerabilityCVE-2025-32915cvecve-2025-32915cwe-732
Published: Thu May 22 2025 (05/22/2025, 14:16:01 UTC)
Source: CVE
Vendor/Project: Checkmk GmbH
Product: Checkmk

Description

Packages downloaded by Checkmk's automatic agent updates on Linux and Solaris have incorrect permissions in Checkmk < 2.4.0p1, < 2.3.0p32, < 2.2.0p42 and <= 2.1.0p49 (EOL). This allows a local attacker to read sensitive data.

AI-Powered Analysis

AILast updated: 07/08/2025, 10:11:09 UTC

Technical Analysis

CVE-2025-32915 is a vulnerability identified in Checkmk, a monitoring software developed by Checkmk GmbH, affecting versions prior to 2.4.0p1, 2.3.0p32, 2.2.0p42, and 2.1.0p49 (EOL). The issue stems from incorrect permission assignments on packages downloaded by Checkmk's automatic agent update mechanism on Linux and Solaris systems. Specifically, these packages have permissions that are too permissive, allowing local attackers with limited privileges to read sensitive data that should otherwise be protected. The vulnerability is classified under CWE-732, which relates to incorrect permission assignment for critical resources. The CVSS v4.0 base score is 4.3, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction is needed (UI:N). The vulnerability does not impact confidentiality, integrity, or availability beyond unauthorized data disclosure (VC:N, VI:N, VA:N). No known exploits are currently in the wild, and no patches are explicitly linked in the provided data, though newer versions presumably address the issue. The vulnerability primarily allows unauthorized local reading of sensitive data due to improper file permission settings during automatic agent updates, which could expose configuration details or credentials used by Checkmk agents, potentially aiding further attacks or reconnaissance.

Potential Impact

For European organizations using Checkmk on Linux or Solaris systems, this vulnerability poses a risk of local data exposure. While the vulnerability requires local access with low privileges, it could be exploited by malicious insiders or attackers who have gained limited foothold on the system. Exposure of sensitive monitoring data or credentials could facilitate lateral movement, privilege escalation, or targeted attacks against critical infrastructure. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if sensitive information is leaked. The impact is somewhat limited by the need for local access and the absence of remote exploitation vectors, but the potential for information disclosure remains a concern, especially in environments where multiple users have access or where attackers can escalate from low-privilege accounts.

Mitigation Recommendations

European organizations should upgrade Checkmk installations to versions 2.4.0p1, 2.3.0p32, 2.2.0p42, or later, where this permission issue has been addressed. Until upgrades are applied, administrators should manually verify and correct file permissions on packages downloaded by the automatic agent update process to restrict access to authorized users only. Implement strict access controls on systems running Checkmk agents, limiting local user accounts and enforcing the principle of least privilege. Monitoring and auditing local user activities can help detect attempts to access sensitive files. Additionally, consider disabling automatic agent updates temporarily if manual patching is feasible and monitor vendor communications for official patches or advisories. Employing host-based intrusion detection systems (HIDS) can also help identify unusual file access patterns related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Checkmk
Date Reserved
2025-04-14T09:52:19.272Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f33050acd01a249260fa2

Added to database: 5/22/2025, 2:21:57 PM

Last enriched: 7/8/2025, 10:11:09 AM

Last updated: 8/18/2025, 11:34:34 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats