Vulnerability Details : CVE-2023-1768
Inappropriate error handling in Tribe29 Checkmk <= 2.1.0p25, <= 2.0.0p34, <= 2.2.0b3 (beta), and all versions of Checkmk 1.6.0 causes the symmetric encryption of agent data to fail silently and transmit the data in plaintext in certain configurations.
Products affected by CVE-2023-1768
- cpe:2.3:a:tribe29:checkmk:1.6.0b10:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0b11:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p10:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p17:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p18:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p11:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p12:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p13:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p14:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p15:*:*:*:*:*:*:*
- cpe:2.3:a:tribe29:checkmk:1.6.0p16:*:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p3:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p4:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p5:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p6:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p7:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p8:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p9:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p17:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p18:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p26:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p27:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p28:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:p29:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p30:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p31:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p32:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b11:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b2:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b6:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b7:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:1.6.0:b8:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p33:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.0.0:p34:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*
- cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1768
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1768
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST | |
3.7
|
LOW | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
2.2
|
1.4
|
Checkmk GmbH |
CWE ids for CVE-2023-1768
-
The user interface does not correctly enable or configure a security feature, but the interface provides feedback that causes the user to believe that the feature is in a secure state.Assigned by: security@checkmk.com (Secondary)
References for CVE-2023-1768
-
https://checkmk.com/werk/15423
Linux agent: Handle failing symmetric encryptionPatch;Vendor Advisory
Jump to