Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://checkmk.com/werk/19198 |
|
Wed, 13 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Privilege escalation in the mk_mysql agent plugin on Windows in Checkmk <2.4.0p29, <2.3.0p47, and 2.2.0 (EOL) allows a local unprivileged user able to create a Windows service whose name matches 'MySQL' or 'MariaDB' (or with write access to a binary referenced by such a service) to execute arbitrary code in the context of the Checkmk agent service, which typically runs as SYSTEM. | |
| Title | Privilege escalation via mk_mysql agent plugin on Windows | |
| First Time appeared |
Checkmk
Checkmk checkmk |
|
| Weaknesses | CWE-427 | |
| CPEs | cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Checkmk
Checkmk checkmk |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2026-05-13T12:01:57.840Z
Reserved: 2024-09-18T11:38:53.583Z
Link: CVE-2024-47091
Updated: 2026-05-13T12:01:52.314Z
Status : Awaiting Analysis
Published: 2026-05-13T10:16:14.460
Modified: 2026-05-13T15:57:03.607
Link: CVE-2024-47091
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:30:16Z