5.9
CVSSv3

CVE-2017-14955

Published: 02/10/2017 Updated: 17/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Check_MK prior to 1.2.8p26 mishandles certain errors within the failed-login save feature because of a race condition, which allows remote malicious users to obtain sensitive user information by reading a GUI crash report.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tribe29 checkmk 1.2.5

tribe29 checkmk 1.2.6

tribe29 checkmk 1.2.7

tribe29 checkmk 1.2.3

tribe29 checkmk 1.2.8

tribe29 checkmk 1.2.4

Vendor Advisories

Several security issues were fixed in Checkmk ...

Exploits

1 ADVISORY INFORMATION ======================= Product: Check_mk Vendor URL: mathias-kettnerde/check_mkhtml Type: Race Condition [CWE-362] Date found: 2017-09-21 Date published: 2017-10-18 CVSSv3 Score: 75 (CVSS:30/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) CVE: CVE-2017-14955 2 CREDITS ========== Thi ...
Check_mk versions 128p25 and below suffer from a save_users() race condition that leads to sensitive information disclosure ...