Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32919: CWE-427: Uncontrolled Search Path Element in Checkmk GmbH Checkmk

0
High
VulnerabilityCVE-2025-32919cvecve-2025-32919cwe-427
Published: Thu Oct 09 2025 (10/09/2025, 15:01:42 UTC)
Source: CVE Database V5
Vendor/Project: Checkmk GmbH
Product: Checkmk

Description

Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).

AI-Powered Analysis

AILast updated: 11/03/2025, 18:24:03 UTC

Technical Analysis

CVE-2025-32919 is a vulnerability classified under CWE-427 (Uncontrolled Search Path Element) affecting the Windows License plugin of the Checkmk Windows Agent. The root cause is the use of an insecure temporary directory, which can be manipulated by an attacker with low-level privileges to execute arbitrary code or escalate privileges. This occurs because the plugin does not securely handle the search path for temporary files, allowing an attacker to place malicious executables or scripts in the directory that the plugin will execute with elevated privileges. The affected versions include Checkmk 2.4.0 before patch 2.4.0p13, 2.3.0 before 2.3.0p38, 2.2.0 before 2.2.0p46, and all versions of 2.1.0 which is end-of-life. The vulnerability requires local access with low privileges but does not require user interaction, making it a potent vector for privilege escalation on compromised hosts. The CVSS 4.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity but requiring some privileges. No public exploits are currently known, but the vulnerability's nature suggests it could be leveraged for lateral movement or persistence within enterprise environments. The issue is particularly critical in environments where Checkmk agents run on Windows servers or endpoints with sensitive data or critical operational roles.

Potential Impact

For European organizations, this vulnerability poses a significant risk as Checkmk is widely used for IT infrastructure monitoring across various sectors including finance, healthcare, manufacturing, and critical infrastructure. Successful exploitation can lead to privilege escalation, enabling attackers to gain administrative control over affected Windows hosts. This can compromise the confidentiality and integrity of monitored systems, disrupt availability of monitoring services, and facilitate further attacks such as data exfiltration, ransomware deployment, or sabotage. Given the high CVSS score and the fact that the vulnerability affects multiple versions including some still in active use, organizations that have not updated their Checkmk agents are at considerable risk. The impact is amplified in environments with lax local access controls or where endpoint security is insufficient. Additionally, the vulnerability could be leveraged in targeted attacks against European critical infrastructure or enterprises with high-value assets, increasing potential economic and operational damages.

Mitigation Recommendations

1. Apply official patches from Checkmk as soon as they become available for the affected versions (2.4.0p13, 2.3.0p38, 2.2.0p46 or later). 2. Until patches are applied, restrict local user access on Windows hosts running Checkmk agents to trusted administrators only. 3. Audit and harden permissions on temporary directories used by the Checkmk Windows License plugin to prevent unauthorized file creation or modification. 4. Implement application whitelisting or endpoint protection solutions to detect or block unauthorized execution of code from temporary directories. 5. Monitor logs for unusual activity related to the Checkmk agent or Windows License plugin, including unexpected file creations or executions in temp paths. 6. Consider isolating critical monitoring hosts and applying network segmentation to limit lateral movement opportunities. 7. Educate system administrators about the risk and ensure timely updates of monitoring software. 8. Review and tighten local privilege assignments to minimize the number of users with low-level access that could exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Checkmk
Date Reserved
2025-04-14T09:52:19.273Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e7cfcdba0e608b4f9eb506

Added to database: 10/9/2025, 3:07:57 PM

Last enriched: 11/3/2025, 6:24:03 PM

Last updated: 11/25/2025, 1:15:47 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats