Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64996: CWE-732: Incorrect Permission Assignment for Critical Resource in Checkmk GmbH Checkmk

0
Medium
VulnerabilityCVE-2025-64996cvecve-2025-64996cwe-732
Published: Tue Nov 18 2025 (11/18/2025, 15:10:53 UTC)
Source: CVE Database V5
Vendor/Project: Checkmk GmbH
Product: Checkmk

Description

In Checkmk versions prior to 2.4.0p16, 2.3.0p41, and all versions of 2.2.0 and older, the mk_inotify plugin creates world-readable and writable files, allowing any local user on the system to read the plugin's output and manipulate it, potentially leading to unauthorized access to or modification of monitoring data.

AI-Powered Analysis

AILast updated: 11/18/2025, 15:33:48 UTC

Technical Analysis

CVE-2025-64996 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting Checkmk, a popular IT infrastructure monitoring software developed by Checkmk GmbH. The issue arises from the mk_inotify plugin, which in affected versions (prior to 2.4.0p16, 2.3.0p41, and all 2.2.0 and older) creates files with overly permissive file system permissions—specifically, world-readable and writable. This misconfiguration allows any local user on the system, regardless of privilege level, to read the plugin's output files and manipulate them. Such unauthorized access can compromise the confidentiality and integrity of monitoring data, potentially misleading administrators or automated systems relying on accurate monitoring information. The vulnerability requires local access with low privileges but does not require user interaction or authentication beyond that. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local) and the requirement for low privileges but no user interaction. The scope is limited to confidentiality and integrity impacts with no direct availability impact. No public exploits have been reported yet, but the vulnerability poses a risk especially in multi-user environments or where local access controls are weak. Since monitoring data is critical for operational awareness and incident response, tampering could delay detection of other attacks or cause misinformed operational decisions.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure and modification of monitoring data, undermining trust in IT infrastructure monitoring systems. This can result in delayed detection of security incidents, misconfiguration going unnoticed, or false alarms, impacting operational security and compliance with regulations such as NIS2 and GDPR. Organizations in sectors with stringent monitoring requirements—such as finance, healthcare, energy, and critical infrastructure—may face increased risk of insider threats or lateral movement by attackers who gain local access. The ability for low-privileged users to manipulate monitoring outputs could also facilitate privilege escalation or persistence by hiding malicious activity. Although the vulnerability does not directly impact availability, the indirect effects on incident response and system integrity can have significant operational consequences. European entities relying on Checkmk for centralized monitoring should consider this vulnerability a moderate risk that requires timely remediation to maintain security posture and regulatory compliance.

Mitigation Recommendations

1. Upgrade Checkmk to versions 2.4.0p16, 2.3.0p41, or later, where the mk_inotify plugin permissions are correctly set. 2. Until patches are applied, restrict local user access to systems running Checkmk monitoring agents or servers to trusted personnel only. 3. Implement strict file system access controls and use mandatory access control (MAC) frameworks like SELinux or AppArmor to enforce least privilege on Checkmk plugin files. 4. Regularly audit file permissions and ownership of monitoring plugin outputs to detect any unauthorized changes. 5. Monitor local user activity and employ endpoint detection and response (EDR) solutions to detect suspicious file manipulations or privilege escalations. 6. Consider isolating monitoring infrastructure components on dedicated hosts with minimal user access. 7. Document and enforce policies for local user account management to reduce risk of unauthorized local access. 8. Review and enhance logging and alerting for changes to monitoring data files to enable rapid detection of tampering attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Checkmk
Date Reserved
2025-11-12T09:16:24.091Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c901eb718280d68a97e59

Added to database: 11/18/2025, 3:26:22 PM

Last enriched: 11/18/2025, 3:33:48 PM

Last updated: 11/19/2025, 3:19:27 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats