Improper restriction of excessive authentication attempts on some authentication methods in Checkmk before 2.3.0b5 (beta), 2.2.0p26, 2.1.0p43, and in Checkmk 2.0.0 (EOL) facilitates password brute-forcing.
References
History

Mon, 09 Dec 2024 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: Checkmk

Published: 2024-04-24T11:25:36.306Z

Updated: 2024-08-02T00:56:58.650Z

Reserved: 2024-03-11T13:21:43.122Z

Link: CVE-2024-28825

cve-icon Vulnrichment

Updated: 2024-04-24T14:30:12.652Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-24T12:15:06.887

Modified: 2024-12-09T13:43:48.223

Link: CVE-2024-28825

cve-icon Redhat

No data.