Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 04 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p37:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p38:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p39:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p40:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p41:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p42:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p43:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p44:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p45:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p8:*:*:*:*:*:* cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 14 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Checkmk
Checkmk checkmk Microsoft Microsoft windows |
|
| Vendors & Products |
Checkmk
Checkmk checkmk Microsoft Microsoft windows |
Thu, 09 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL). | |
| Title | Privilege Escalation in Windows License plugin for Checkmk Windows Agent | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2025-11-03T17:32:30.502Z
Reserved: 2025-04-14T09:52:19.273Z
Link: CVE-2025-32919
Updated: 2025-11-03T17:32:30.502Z
Status : Analyzed
Published: 2025-10-09T15:16:06.057
Modified: 2025-12-04T20:39:36.420
Link: CVE-2025-32919
No data.
OpenCVE Enrichment
Updated: 2025-10-10T11:18:02Z