No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://checkmk.com/werk/18954 |
|
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of session signing secret in Checkmk <2.4.0p23, <2.3.0p45 and 2.2.0 allows an administrator of a remote site with config sync enabled to hijack sessions on the central site by forging session cookies. | |
| Title | Session hijacking via exposed session signing secret in distributed Checkmk setups | |
| First Time appeared |
Checkmk
Checkmk checkmk |
|
| Weaknesses | CWE-522 | |
| CPEs | cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Checkmk
Checkmk checkmk |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2026-03-24T14:06:08.395Z
Reserved: 2025-11-12T09:16:24.093Z
Link: CVE-2025-64998
Updated: 2026-03-24T14:05:15.260Z
Status : Awaiting Analysis
Published: 2026-03-24T12:16:11.930
Modified: 2026-03-24T15:53:48.067
Link: CVE-2025-64998
No data.
OpenCVE Enrichment
No data.