CVE-2025-39666

Enriched by CISA
 

Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows a site user to escalate their privileges to root, by manipulating files in the site context that are processed when the `omd` administrative command is run by root.
https://nvd.nist.gov/vuln/detail/CVE-2025-39666

Categories

CWE-426 : Untrusted Search Path

References

security@checkmk.com


 

AFFECTED (from MITRE)


Vendor Product Versions
Checkmk GmbH Checkmk
  • 2.2.0 [affected]
  • 2.3.0 < 2.3.0p46 [affected]
  • 2.4.0 < 2.4.0p25 [affected]
  • 2.5.0b1 < 2.5.0b3 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* >= 2.3.0 < 2.3.0p46
cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* >= 2.4.0 < 2.4.0p25
cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* >= 2.5.0b1 < 2.5.0b3


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
38 Leveraging/Manipulating Configuration File Search Paths
Very High


MITRE


Techniques

id description
T1574.007 Hijack Execution Flow:Path Interception by PATH Environment Variable
T1574.009 Hijack Execution Flow: Path Interception by Unquoted Path
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
M1022 Ensure that proper permissions and directory access control are set to deny users the ability to write files to the top-level directory <code>C:</code> and system directories, such as <code>C:Windows</code>, to reduce places where malicious files could be placed for execution. Require that all executables be placed in write-protected directories.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.