Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://checkmk.com/werk/19030 |
|
Thu, 18 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SSH private keys of the "Remote alert handlers (Linux)" rule were exposed in the rule page's HTML source in Checkmk <= 2.4.0p18 and all versions of Checkmk 2.3.0. This potentially allowed unauthorized triggering of predefined alert handlers on hosts where the handler was deployed. | |
| Title | Exposure of SSH Private Keys in Remote Alert Handlers (Linux) Rule | |
| First Time appeared |
Checkmk
Checkmk checkmk |
|
| Weaknesses | CWE-212 | |
| CPEs | cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Checkmk
Checkmk checkmk |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2025-12-18T15:28:51.856Z
Reserved: 2025-11-12T09:16:24.095Z
Link: CVE-2025-65000
Updated: 2025-12-18T15:28:43.968Z
Status : Awaiting Analysis
Published: 2025-12-18T14:15:59.947
Modified: 2025-12-18T15:07:18.427
Link: CVE-2025-65000
No data.
OpenCVE Enrichment
No data.