• Home
  • About Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Sitemap
  • Terms and Conditions
No Result
View All Result
Oakpedia
  • Home
  • Technology
  • Computers
  • Cybersecurity
  • Gadgets
  • Robotics
  • Artificial intelligence
  • Home
  • Technology
  • Computers
  • Cybersecurity
  • Gadgets
  • Robotics
  • Artificial intelligence
No Result
View All Result
Oakpedia
No Result
View All Result
Home Cybersecurity

A number of Vulnerabilities Reported in Checkmk IT Infrastructure Monitoring Software program

by Oakpedia
November 3, 2022
0
325
SHARES
2.5k
VIEWS
Share on FacebookShare on Twitter


A number of vulnerabilities have been disclosed in Checkmk IT Infrastructure monitoring software program that could possibly be chained collectively by an unauthenticated, distant attacker to totally take over affected servers.

“These vulnerabilities could be chained collectively by an unauthenticated, distant attacker to achieve code execution on the server working Checkmk model 2.1.0p10 and decrease,” SonarSource researcher Stefan Schiller mentioned in a technical evaluation.

Checkmk’s open supply version of the monitoring instrument is predicated on Nagios Core and affords integrations with NagVis for the visualization and technology of topological maps of infrastructures, servers, ports, and processes.

Based on its Munich-based developer tribe29 GmbH, its Enterprise and Uncooked editions are utilized by over 2,000 clients, together with Airbus, Adobe, NASA, Siemens, Vodafone, and others.

Checkmk IT Infrastructure Monitoring Software

The 4 vulnerabilities, which encompass two Vital and two Medium severity bugs, are as follows –

Whereas these shortcomings on their very own have a restricted impression, an adversary can chain the problems, beginning with the SSRF flaw to entry an endpoint solely reachable from localhost, utilizing it to bypass authentication and browse a configuration file, finally having access to the Checkmk GUI.

CyberSecurity

“This entry can additional be become distant code execution by exploiting a Code Injection vulnerability in a Checkmk GUI subcomponent referred to as watolib, which generates a file named auth.php required for the NagVis integration,” Schiller defined.

Following accountable disclosure on August 22, 2022, the 4 vulnerabilities have been patched in Checkmk model 2.1.0p12 launched on September 15, 2022.

The findings comply with the invention of a number of flaws in different monitoring options like Zabbix and Icinga because the begin of the 12 months, which may have been exploited to compromise the servers by working arbitrary code.





Source_link

Previous Post

A Day Earlier than AMD’s RDNA 3 Drops, PowerColor Teases Purple Satan RX 7000 Design

Next Post

Twitter cancels its Chirp convention for builders amid administration transition • TechCrunch

Oakpedia

Oakpedia

Next Post
Twitter cancels its Chirp convention for builders amid administration transition • TechCrunch

Twitter cancels its Chirp convention for builders amid administration transition • TechCrunch

No Result
View All Result

Categories

  • Artificial intelligence (326)
  • Computers (462)
  • Cybersecurity (511)
  • Gadgets (509)
  • Robotics (191)
  • Technology (565)

Recent.

Fingers on Otsu Thresholding Algorithm for Picture Background Segmentation, utilizing Python | by Piero Paialunga | Mar, 2023

Fingers on Otsu Thresholding Algorithm for Picture Background Segmentation, utilizing Python | by Piero Paialunga | Mar, 2023

March 21, 2023
New DotRunpeX Malware Delivers A number of Malware Households through Malicious Adverts

New DotRunpeX Malware Delivers A number of Malware Households through Malicious Adverts

March 21, 2023
Some RTX 4070 GPUs Will Use 16-Pin Energy Connector

Some RTX 4070 GPUs Will Use 16-Pin Energy Connector

March 21, 2023

Oakpedia

Welcome to Oakpedia The goal of Oakpedia is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

  • Home
  • About Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Sitemap
  • Terms and Conditions

Copyright © 2022 Oakpedia.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Technology
  • Computers
  • Cybersecurity
  • Gadgets
  • Robotics
  • Artificial intelligence

Copyright © 2022 Oakpedia.com | All Rights Reserved.