The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0012}

epss

{'score': 0.0017}


Thu, 06 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Feb 2025 01:30:00 +0000


Tue, 04 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Description The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
Title Checkmk NagVis Remote Code Execution
Weaknesses CWE-434
References

cve-icon MITRE

Status: PUBLISHED

Assigner: KoreLogic

Published:

Updated: 2025-02-06T14:43:37.316Z

Reserved: 2025-01-24T18:22:56.194Z

Link: CVE-2024-13723

cve-icon Vulnrichment

Updated: 2025-02-05T00:10:34.577Z

cve-icon NVD

Status : Received

Published: 2025-02-04T22:15:40.227

Modified: 2025-02-06T15:15:13.050

Link: CVE-2024-13723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.