CVE-2026-24097
Received Received - Intake
Information Disclosure via Improper Permission in Checkmk Agent Receiver

Publication date: 2026-03-13

Last updated on: 2026-03-18

Assigner: Checkmk GmbH

Description
Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p23, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows authenticated users to enumerate existing hosts by observing different HTTP response codes in agent-receiver/register_existing endpoint, which could lead to information disclosure.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-13
Last Modified
2026-03-18
Generated
2026-05-07
AI Q&A
2026-03-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 135 associated CPEs
Vendor Product Version / Range
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.3.0
checkmk checkmk 2.3.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
checkmk checkmk 2.4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-204 The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-24097 is a security vulnerability in Checkmk's agent-receiver component, specifically in the agent-receiver/register_existing endpoint."}, {'type': 'paragraph', 'content': 'Before the fix, any authenticated user could enumerate existing hosts by analyzing different HTTP response codes returned by this endpoint.'}, {'type': 'paragraph', 'content': "The vulnerability occurred because the endpoint checked if a host existed before verifying the user's permissions, allowing users to distinguish between a 404 Not Found response (host does not exist) and a 403 Forbidden response (host exists but access is denied)."}, {'type': 'paragraph', 'content': 'This behavior enabled unauthorized users to gather information about existing hosts, leading to information disclosure.'}, {'type': 'paragraph', 'content': 'The fix changes the endpoint to return a 403 Forbidden response both when the host does not exist and when the user lacks sufficient privileges, preventing host enumeration.'}] [1]


How can this vulnerability impact me? :

This vulnerability allows authenticated users to enumerate existing hosts in the Checkmk system by observing different HTTP response codes.

Such host enumeration can lead to information disclosure, revealing details about the network or infrastructure that should remain confidential.

Attackers or unauthorized users could use this information to plan further attacks or gain insights into the environment.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to enumerate hosts via the `agent-receiver/register_existing` endpoint while authenticated. By observing the HTTP response codes, an attacker can distinguish whether a host exists or not based on differing responses (404 Not Found vs 403 Forbidden).'}, {'type': 'paragraph', 'content': 'To detect this on your system, you can perform authenticated HTTP requests to the `agent-receiver/register_existing` endpoint with different hostnames and observe the response codes. If the endpoint returns 404 for non-existent hosts and 403 for existing hosts without proper permission checks, the system is vulnerable.'}, {'type': 'paragraph', 'content': 'Example command using curl (replace <host> and <auth_token> accordingly):'}, {'type': 'list_item', 'content': 'curl -i -H "Authorization: Bearer <auth_token>" "https://<checkmk-server>/agent-receiver/register_existing?host=<hostname>"'}, {'type': 'paragraph', 'content': 'By testing multiple hostnames and comparing the HTTP status codes, you can verify if host enumeration is possible.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to apply the security update provided by Checkmk that fixes the permission enforcement in the `agent-receiver/register_existing` endpoint.

The fix changes the endpoint to return a 403 Forbidden response both when the host does not exist and when the user lacks sufficient privileges, preventing host enumeration.

No manual interaction is required to apply the fix other than updating to the patched versions: 2.4.0p23 or later, 2.3.0p43 or later, or upgrading from the end-of-life 2.2.0.

Until the update is applied, consider restricting authenticated user access to the affected endpoint or monitoring for suspicious enumeration activity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart