Lucene search

K
cve[email protected]CVE-2023-23549
HistoryNov 15, 2023 - 11:15 a.m.

CVE-2023-23549

2023-11-1511:15:08
CWE-20
web.nvd.nist.gov
20
cve-2023-23549
improper input validation
checkmk
security vulnerability
partial denial of service
nvd

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%

Improper Input Validation in Checkmk <2.2.0p15, <2.1.0p37, <=2.0.0p39 allows priviledged attackers to cause partial denial of service of the UI via too long hostnames.

Affected configurations

NVD
Node
tribe29checkmkMatch2.0.0-
OR
tribe29checkmkMatch2.0.0b1
OR
tribe29checkmkMatch2.0.0b2
OR
tribe29checkmkMatch2.0.0b3
OR
tribe29checkmkMatch2.0.0b4
OR
tribe29checkmkMatch2.0.0b5
OR
tribe29checkmkMatch2.0.0b6
OR
tribe29checkmkMatch2.0.0b7
OR
tribe29checkmkMatch2.0.0b8
OR
tribe29checkmkMatch2.0.0i1
OR
tribe29checkmkMatch2.0.0p1
OR
tribe29checkmkMatch2.0.0p10
OR
tribe29checkmkMatch2.0.0p11
OR
tribe29checkmkMatch2.0.0p12
OR
tribe29checkmkMatch2.0.0p13
OR
tribe29checkmkMatch2.0.0p14
OR
tribe29checkmkMatch2.0.0p15
OR
tribe29checkmkMatch2.0.0p16
OR
tribe29checkmkMatch2.0.0p17
OR
tribe29checkmkMatch2.0.0p18
OR
tribe29checkmkMatch2.0.0p19
OR
tribe29checkmkMatch2.0.0p2
OR
tribe29checkmkMatch2.0.0p20
OR
tribe29checkmkMatch2.0.0p21
OR
tribe29checkmkMatch2.0.0p22
OR
tribe29checkmkMatch2.0.0p23
OR
tribe29checkmkMatch2.0.0p24
OR
tribe29checkmkMatch2.0.0p25
OR
tribe29checkmkMatch2.0.0p26
OR
tribe29checkmkMatch2.0.0p27
OR
tribe29checkmkMatch2.0.0p28
OR
tribe29checkmkMatch2.0.0p29
OR
tribe29checkmkMatch2.0.0p3
OR
tribe29checkmkMatch2.0.0p30
OR
tribe29checkmkMatch2.0.0p31
OR
tribe29checkmkMatch2.0.0p32
OR
tribe29checkmkMatch2.0.0p33
OR
tribe29checkmkMatch2.0.0p34
OR
tribe29checkmkMatch2.0.0p35
OR
tribe29checkmkMatch2.0.0p36
OR
tribe29checkmkMatch2.0.0p37
OR
tribe29checkmkMatch2.0.0p38
OR
tribe29checkmkMatch2.0.0p39
OR
tribe29checkmkMatch2.0.0p4
OR
tribe29checkmkMatch2.0.0p5
OR
tribe29checkmkMatch2.0.0p6
OR
tribe29checkmkMatch2.0.0p7
OR
tribe29checkmkMatch2.0.0p8
OR
tribe29checkmkMatch2.0.0p9
OR
tribe29checkmkMatch2.1.0-
OR
tribe29checkmkMatch2.1.0b1
OR
tribe29checkmkMatch2.1.0b2
OR
tribe29checkmkMatch2.1.0b3
OR
tribe29checkmkMatch2.1.0b4
OR
tribe29checkmkMatch2.1.0b5
OR
tribe29checkmkMatch2.1.0b6
OR
tribe29checkmkMatch2.1.0b7
OR
tribe29checkmkMatch2.1.0b8
OR
tribe29checkmkMatch2.1.0b9
OR
tribe29checkmkMatch2.1.0p1
OR
tribe29checkmkMatch2.1.0p10
OR
tribe29checkmkMatch2.1.0p11
OR
tribe29checkmkMatch2.1.0p12
OR
tribe29checkmkMatch2.1.0p13
OR
tribe29checkmkMatch2.1.0p14
OR
tribe29checkmkMatch2.1.0p15
OR
tribe29checkmkMatch2.1.0p16
OR
tribe29checkmkMatch2.1.0p17
OR
tribe29checkmkMatch2.1.0p18
OR
tribe29checkmkMatch2.1.0p19
OR
tribe29checkmkMatch2.1.0p2
OR
tribe29checkmkMatch2.1.0p20
OR
tribe29checkmkMatch2.1.0p21
OR
tribe29checkmkMatch2.1.0p22
OR
tribe29checkmkMatch2.1.0p23
OR
tribe29checkmkMatch2.1.0p24
OR
tribe29checkmkMatch2.1.0p25
OR
tribe29checkmkMatch2.1.0p26
OR
tribe29checkmkMatch2.1.0p27
OR
tribe29checkmkMatch2.1.0p28
OR
tribe29checkmkMatch2.1.0p29
OR
tribe29checkmkMatch2.1.0p3
OR
tribe29checkmkMatch2.1.0p30
OR
tribe29checkmkMatch2.1.0p31
OR
tribe29checkmkMatch2.1.0p32
OR
tribe29checkmkMatch2.1.0p33
OR
tribe29checkmkMatch2.1.0p34
OR
tribe29checkmkMatch2.1.0p35
OR
tribe29checkmkMatch2.1.0p36
OR
tribe29checkmkMatch2.1.0p4
OR
tribe29checkmkMatch2.1.0p5
OR
tribe29checkmkMatch2.1.0p6
OR
tribe29checkmkMatch2.1.0p7
OR
tribe29checkmkMatch2.1.0p8
OR
tribe29checkmkMatch2.1.0p9
OR
tribe29checkmkMatch2.2.0-
OR
tribe29checkmkMatch2.2.0b1
OR
tribe29checkmkMatch2.2.0b2
OR
tribe29checkmkMatch2.2.0b3
OR
tribe29checkmkMatch2.2.0b4
OR
tribe29checkmkMatch2.2.0b5
OR
tribe29checkmkMatch2.2.0b6
OR
tribe29checkmkMatch2.2.0b7
OR
tribe29checkmkMatch2.2.0b8
OR
tribe29checkmkMatch2.2.0i1
OR
tribe29checkmkMatch2.2.0p1
OR
tribe29checkmkMatch2.2.0p10
OR
tribe29checkmkMatch2.2.0p11
OR
tribe29checkmkMatch2.2.0p12
OR
tribe29checkmkMatch2.2.0p13
OR
tribe29checkmkMatch2.2.0p2
OR
tribe29checkmkMatch2.2.0p3
OR
tribe29checkmkMatch2.2.0p4
OR
tribe29checkmkMatch2.2.0p5
OR
tribe29checkmkMatch2.2.0p6
OR
tribe29checkmkMatch2.2.0p7
OR
tribe29checkmkMatch2.2.0p8
OR
tribe29checkmkMatch2.2.0p9

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Checkmk",
    "vendor": "Checkmk GmbH",
    "versions": [
      {
        "lessThan": "2.2.0p15",
        "status": "affected",
        "version": "2.2.0",
        "versionType": "semver"
      },
      {
        "lessThan": "2.1.0p37",
        "status": "affected",
        "version": "2.1.0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2.0.0p39",
        "status": "affected",
        "version": "2.0.0",
        "versionType": "semver"
      }
    ]
  }
]

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%